Showing 1 - 5 results of 5
Refine Results
1
2
Integrated circuit authentication : hardware Trojans and counterfeit detection
Call Number
Loading…
Book
Loading…
3
Introduction to hardware security and trust
Year of Publication 2012
Call Number
Loading…
Book
Loading…
4
Hardware Protection through Obfuscation
Year of Publication 2017
Call Number
Loading…
Full text
Electronic
eBook
5
Hardware IP security and trust
Year of Publication 2017
Call Number
Loading…
Full text
Electronic
eBook