Login / Signup
Secure split test techniques to prevent IC piracy for IoT devices.
K. Sudeendra Kumar
G. Hanumanta Rao
Sauvagya Ranjan Sahoo
Kamala Kanta Mahapatra
Published in:
Integr. (2017)
Keyphrases
</>
key management
mobile devices
security mechanisms
management system
cloud computing
rfid systems
neural network
test data
embedded systems
countermeasures
mobile agent system