Design Comparison to Identify Malicious Hardware in External Intellectual Property
2002 ◽
Vol 12
(1)
◽
pp. 4-9
Keyword(s):