Login / Signup

Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation.

Mohammad-Mahdi BidmeshkiXiaolong GuoRaj Gautam DuttaYier JinYiorgos Makris
Published in: IEEE Trans. Inf. Forensics Secur. (2017)
Keyphrases
  • information flow
  • data sets
  • data analysis
  • data processing
  • data sources
  • data mining techniques
  • computer systems
  • data acquisition
  • real time