Login / Signup

Securing IP Cores in CE Systems using Key-driven Hash-chaining based Steganography.

Mahendra RathorPallabi SarkarVipul Kumar MishraAnirban Sengupta
Published in: ICCE-Berlin (2020)
Keyphrases
  • key technologies
  • intelligent systems
  • real time
  • database systems
  • computer systems
  • intrusion detection
  • retrieval systems