Login / Signup
Hardware Trojan Protection for Third Party IPs.
Amr Al-Anwar
Yousra Alkabani
M. Watheq El-Kharashi
Hassan Bedour
Published in:
DSD (2013)
Keyphrases
</>
third party
protection scheme
low cost
personal information
sensitive information
privacy protection
private information
reverse logistics
protection schemes
information security
computer systems
mashup
critical infrastructure