Sign in

Analysis of Circuits for Security Using Logic Encryption.

Bandarupalli ChandiniM. Nirmala Devi
Published in: SSCC (2018)
Keyphrases
  • data analysis
  • identity authentication
  • security requirements
  • encryption scheme
  • key management
  • security analysis
  • key exchange