Login / Signup

Secure split test techniques to prevent IC piracy for IoT devices.

K. Sudeendra KumarG. Hanumanta RaoSauvagya Ranjan SahooKamala Kanta Mahapatra
Published in: Integr. (2017)
Keyphrases
  • key management
  • mobile devices
  • security mechanisms
  • management system
  • cloud computing
  • rfid systems
  • neural network
  • test data
  • embedded systems
  • countermeasures
  • mobile agent system