Login / Signup
PUF based on chip comparison technique for trustworthy scan design data security against side channel attack.
Shiny Mukkath I.
Nirmala Devi M.
Published in:
Int. J. Cloud Comput. (2023)
Keyphrases
</>
data security
countermeasures
data integrity
access control
case study
distributed databases
information security
data centric