Login / Signup
On Protecting IJTAG using an Inherently Secure SIB.
Anjum Riaz
Gaurav Kumar
Pardeep Kumar
Yamuna Prasad
Satyadev Ahlawat
Published in:
VLSI-SoC (2023)
Keyphrases
</>
access control
unauthorized access
identity management
security requirements
data protection
security analysis
information bottleneck
case study
highly efficient
smart card
security protocols
standard model
cryptographic protocols
scalar product