Login / Signup
Securing IP Cores in CE Systems using Key-driven Hash-chaining based Steganography.
Mahendra Rathor
Pallabi Sarkar
Vipul Kumar Mishra
Anirban Sengupta
Published in:
ICCE-Berlin (2020)
Keyphrases
</>
key technologies
intelligent systems
real time
database systems
computer systems
intrusion detection
retrieval systems