Login / Signup

Detecting malicious modifications of data in third-party intellectual property cores.

Jeyavijayan RajendranVivekananda VedulaRamesh Karri
Published in: DAC (2015)
Keyphrases
  • privacy protection
  • sensitive information
  • third party
  • intellectual property
  • data providers
  • data mining
  • information systems
  • load balancing