Login / Signup
Exploiting Process Variations to Secure Photonic NoC Architectures from Snooping Attacks.
Sai Vineel Reddy Chittamuru
Ishan G. Thakkar
Sudeep Pasricha
Sairam Sri Vatsavai
Varun Bhat
Published in:
CoRR (2020)
Keyphrases
</>
peer to peer
process model