Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection.
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection.
This book describes techniques to verify the authenticity of integrated circuits (ICs). It details a variety of detection schemes and design methodologies for improving Trojan detection techniques.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.