Login / Signup

BISA: Built-in self-authentication for preventing hardware Trojan insertion.

Kan XiaoMohammad Tehranipoor
Published in: HOST (2013)
Keyphrases
  • real time
  • low cost
  • hardware and software
  • image authentication
  • information systems
  • data acquisition
  • hardware implementation
  • computing power
  • neural network
  • image processing
  • authentication scheme