Login / Signup
BISA: Built-in self-authentication for preventing hardware Trojan insertion.
Kan Xiao
Mohammad Tehranipoor
Published in:
HOST (2013)
Keyphrases
</>
real time
low cost
hardware and software
image authentication
information systems
data acquisition
hardware implementation
computing power
neural network
image processing
authentication scheme