Search Results

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Reconfigurable Cryptographic Processor by Liu, Leibo, Wang, Bo, Wei, Shaojun

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  6. 6

    The Hardware Trojan War Attacks, Myths, and Defenses /

    Published 2018
    Full-text access
    View in OPAC
    e-Book
  7. 7
  8. 8

    Steganography Techniques for Digital Images by Yahya, Abid

    Published 2019
    Full-text access
    View in OPAC
    e-Book
  9. 9

    Hardware Protection through Obfuscation

    Published 2017
    Full-text access
    View in OPAC
    e-Book
  10. 10

    Hardware IP Security and Trust

    Published 2017
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Mobile and Wireless Technologies 2016

    Published 2016
    Full-text access
    View in OPAC
    e-Book
  12. 12
  13. 13
  14. 14
  15. 15