C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Provably secure camouflaging strategy for IC protection.
Meng Li
Kaveh Shamsi
Travis Meade
Zheng Zhao
Bei Yu
Yier Jin
David Z. Pan
Published in:
ICCAD (2016)
Keyphrases
</>
provably secure
public key
standard model
key management
blind signature
real time
information systems
information security
hash functions