Sign in

Exploiting Process Variations to Secure Photonic NoC Architectures From Snooping Attacks.

Sai Vineel Reddy ChittamuruIshan G. ThakkarSudeep PasrichaSairam Sri VatsavaiVarun Bhat
Published in: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2021)
Keyphrases
  • countermeasures
  • process model
  • security requirements
  • security mechanisms
  • security threats