This book proposes a synergistic framework to help IP vendors to
protect hardware IP privacy and integrity from design,
optimization, and evaluation perspectives. The proposed framework
consists of five interacting components that directly target at the
primary IP violations. All the five algorithms are developed based
on rigorous mathematical modeling for primary IP violations and
focus on different stages of IC design, which can be combined to
provide a formal security guarantee.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!