Methods of designing the hardware, reducing the risk of theft involving implementation details
Published: 18.11.2013
Authors: Glinskaya E.V., Fenske A.V.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-990
Category: Information technology | Chapter: Information Security