Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,390,551 papers from all fields of science
Search
Sign In
Create Free Account
EEPROM
Known as:
EEPROM memory chip
, Electrically alterable read-only memory
, E²PROM
Expand
EEPROM (also written E2PROM and pronounced "e-e-prom", "double-e-prom" or "e-squared-prom") stands for electrically erasable programmable read-only…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
AVR Butterfly
Advanced Communications Riser
Answer to reset
Ant Attack
Expand
Broader (1)
Non-volatile memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
Franck Courbon
,
S. Skorobogatov
,
C. Woods
Smart Card Research and Advanced Application…
2016
Corpus ID: 10104918
In this article, a methodology to extract Flash EEPROM memory contents is presented. Samples are first backside prepared to…
Expand
Highly Cited
2014
Highly Cited
2014
RAMSES: RFID Augmented Module for Smart Environmental Sensing
Danilo De Donno
,
L. Catarinucci
,
L. Tarricone
IEEE Transactions on Instrumentation and…
2014
Corpus ID: 6736923
This paper presents a radio frequency identification (RFID) augmented module for smart environmental sensing (RAMSES), which is a…
Expand
Highly Cited
2013
Highly Cited
2013
Cloning Physically Unclonable Functions
Clemens Helfmeier
,
C. Boit
,
Dmitry Nedospasov
,
Jean-Pierre Seifert
IEEE International Symposium on Hardware Oriented…
2013
Corpus ID: 17758701
As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage…
Expand
Highly Cited
2005
Highly Cited
2005
Biometric template security: Challenges and solutions
Anil K. Jain
,
A. Ross
,
Umut Uludag
European Signal Processing Conference
2005
Corpus ID: 2631197
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These…
Expand
Highly Cited
2004
Highly Cited
2004
An approach to security and privacy of RFID system for supply chain
Xingxin Gao
,
Zhe Xiang
,
Hao Wang
,
Jun Shen
,
Jian Huang
,
Song Song
IEEE International Conference on E-Commerce…
2004
Corpus ID: 15916460
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items…
Expand
Highly Cited
1997
Highly Cited
1997
Single-event upset in flash memories
H. Schwartz
,
D. Nichols
,
A. Johnston
1997
Corpus ID: 56517774
Single-event upset was investigated in high-density flash memories from two different manufacturers. Many types of functional…
Expand
Review
1996
Review
1996
Cryptographic smart cards
D. Naccache
,
David M'Raïhi
IEEE Micro
1996
Corpus ID: 29313603
Smart cards have the tremendous advantage over their magnetic-stripe ancestors of being able to execute cryptographic algorithms…
Expand
Highly Cited
1989
Highly Cited
1989
A set of four ICs in CMOS technology for a programmable hearing aid
F. Callias
,
F. H. Salchli
,
D. Girard
1989
Corpus ID: 57511124
A four-chip system developed for a programmable hearing aid is presented. It combines E/sup 2/PROM (electrically erasable…
Expand
Highly Cited
1986
Highly Cited
1986
Hole trapping and breakdown in thin SiO2
I. Chen
,
S. Holland
,
C. Hu
IEEE Electron Device Letters
1986
Corpus ID: 32692236
The field dependence of the hole generation rate, also known as the impact ionization coefficient α, in thin SiO2(< 20 nm) was…
Expand
Highly Cited
1984
Highly Cited
1984
A new flash E2PROM cell using triple polysilicon technology
F. Masuoka
,
M. Asano
,
H. Iwahashi
,
T. Komuro
,
S. Tanaka
International Electron Devices Meeting
1984
Corpus ID: 25967023
A new Flash Electrically Erasable-PROM cell with single transistor per bit as same as conventional UV-EPROM(1) (2) and suitable…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required