Sign in

PUF based on chip comparison technique for trustworthy scan design data security against side channel attack.

Shiny Mukkath I.Nirmala Devi M.
Published in: Int. J. Cloud Comput. (2023)
Keyphrases
  • data security
  • countermeasures
  • data integrity
  • access control
  • case study
  • distributed databases
  • information security
  • data centric