Sign in

Providing secure execution environments with a last line of defense against Trojan circuit attacks.

Gedare BloomBhagirath NarahariRahul SimhaJoseph Zambreno
Published in: Comput. Secur. (2009)
Keyphrases