Sign in

An evolutionary approach to hardware encryption and Trojan-horse mitigation.

Andrea MarcelliMarco RestifoErnesto SánchezGiovanni Squillero
Published in: DATE (2017)
Keyphrases