Intellectual property metering(15)
时间:2026-01-22
时间:2026-01-22
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts and copied programs. The key idea is to make each design slightly different d
[15] M.K. Franklin, D. Malkhi, “Auditable metering with lightweight security”. Journal of Com-
puter Security, vol.6, (no.4), IOS Press, 1998. p.237-55.
[16] M.R. Garey, D.S. Johnson. “Computers and intractability. A guide to the theory of NP-com-
pleteness.” Oxford, UK: Freeman, 1979.
[17] L.M. Guerra, M. Potkonjak, J.M. Rabaey, “Behavioral-level synthesis of heterogeneous BISR
reconfigurable ASIC’s.”IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol.6, (no.1), March 1998. p.158-67.
[18] F. Hartung, M. Kutter. “Multimedia watermarking techniques.” Proceedings of the IEEE, July
1999, vol.87, (no.7):1079-107.
[19] A.B. Kahng, J. Lach, W.H. Mangione-Smith, S. Mantik, I.L. Markov, M. Potkonjak, P. Tucker,
H. Wang, and G. Wolfe. “Watermarking techniques for intellectual property protection,” 35th
ACM/IEEE Design Automation Conference Proceedings, pp. 776-781, June 1998.
[20] A.B. Kahng, D. Kirovski, S. Mantik, M. Potkonjak, and J.L. Wong. “Copy detection for intel-
lectual property protection of VLSI design,” IEEE/ACM International Conference on Com-puter Aided Design, pp. 600-604, November 1999.
[21] D. Kirovski, M. Potkonjak. “Efficient coloring of a large spectrum of graphs.” Proceedings
1998 Design and Automation Conference. 35th DAC. pp.427-32., 1998.
[22] D. Kirovski, D. Liu, J.L. Wong, and M. Potkonjak. “Forensic engineering techniques for VLSI
CAD tools,” 37th ACM/IEEE Design Automation Conference Proceedings, June 2000. pp.581-6.
[23] K. Lofstrom, W.R. Daasch, D. Taylor, “IC identification circuits using device mismatch” Pro-
ceedings of the International Solid-State Circuits Conference, pp. 372-3, 2000.
[24] D. P. Maher “Fault induction attacks, tamper resistance, and hostile reverse engineering in per-
spective.”, Financial Cryptography First International Conference, pp. 109-21, 1997.
[25] A. J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of applied cryptography”, Boca
Raton, FL:CRC Press, 1997.
[26] M. Naor, B. Pinkas, “Secure accounting and auditing on the Web”. Computer Networks and
ISDN Systems, vol.30, (no.1-7), Elsevier, April 1998. pp.541-50.
[27] R.L. Rivest (Edited by: Hirschfeld, R.), “Electronic lottery tickets as micropayments.” Finan-
cial Cryptography First International Conference, pp.307-14, 1997.
[28] C.D. Ross, N.W. Taylor, K.W. Kingdon, H.R. Davis, D. Major “Method and apparatus for elec-
tronic licensing”, US patent# 5553143, Sept. 3, 1996
[29] D.C. Thomas “Method and apparatus for providing security for computer software”, US
patent#4446519, May 1984
[30] J. Pitkow, “In search of reliable usage data on the WWW”. Computer Networks and ISDN Sys-
tems, vol.29, (no.8-13), Sept. 1997. p.1343-55.
[31] M. Potkonjak, S. Dey, K. Wakabayashi, “Design-for-Debugging of application specific
designs.” International Conference on Computer-Aided Design, pp. 295-301, 1995.
[32] G. Qu and M. Potkonjak. “Analysis of watermarking techniques for graph coloring problem,”
IEEE/ACM International Conference on Computer Aided Design, pp. 190-193, November 1998.
[33] J.M. Rabaey, C. Chu, P. Hoang, M. Potkonjak, “Fast prototyping of datapath-intensive archi-
tectures.” IEEE Design & Test of Computers, June 1991, vol.8, (no.2):40-51.
[34] B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C /”. 2nd ed.
New York: Wiley, 1996.
[35] D.R. Stinson, “Cryptography: theory and practice”. Boca Raton, FL: CRC Press, 1995.
[36] L. Stok, J.A.G. Jess, “Foreground memory management in data path synthesis.”International
Journal of Circuit Theory and Applications, vol.20, (no.3):235-55. May-June 1992
[37] K. Veenstra, Altera Corporation, Personal Communication., January 1999.
[38]
…… 此处隐藏:1943字,全部文档内容请下载后查看。喜欢就下载吧 ……下一篇:热压机安全操作规程