Publication | Closed Access
Hardware IP Protection During Evaluation Using Embedded Sequential Trojan
27
Citations
4
References
2012
Year
Hardware SecurityHardware TrojanEngineeringEvasion TechniqueInformation SecurityHardware Ip ProtectionComputer EngineeringHardware Security SolutionData SecurityCryptography
Editor's notes:
| Year | Citations | |
|---|---|---|
Page 1
Page 1