Login / Signup
Is the Secure IC camouflaging really secure?
Xueyan Wang
Qiang Zhou
Yici Cai
Gang Qu
Published in:
ISCAS (2016)
Keyphrases
</>
security requirements
data sets
lightweight
security issues
covert channel
database
security management
identity management
security level
user authentication
standard model
security protocols
security analysis
key management
highly efficient
search engine
artificial intelligence
machine learning
real time