Login / Signup
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans.
Kan Xiao
Domenic Forte
Mohammad Tehranipoor
Published in:
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. (2014)
Keyphrases
</>
low cost
real time
hardware and software
computer systems
hardware architecture
identity authentication
image processing
user authentication
data acquisition
authentication scheme
authentication mechanism
ibm zenterprise