Login / Signup
Utilizing sub-threshold technology for the creation of secure circuits.
Syed Imtiaz Haider
Leyla Nazhandali
Published in:
ISCAS (2008)
Keyphrases
</>
data encryption
case study
data processing
security architecture
information systems
data sets
mobile devices
sensor networks
high speed
cost effective
personal computer
key technologies
security issues
cmos technology
asynchronous circuits
threshold selection