Sign in

Exploiting hardware obfuscation methods to prevent and detect hardware Trojans.

Qiaoyan YuJaya DofeZhiming Zhang
Published in: MWSCAS (2017)
Keyphrases