Author:
Mazumdar Bodhisatwa,Saha Soma,Bairwa Ghanshyam,Mandal Souvik,Nikhil Tatavarthy Venkat
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference22 articles.
1. Abdel-Hamid AT, Tahar S, Aboulhamid EM (2004) A survey on IP watermarking techniques. Design Automation for Embedded Systems 9(3):211
2. Dupuis S, Ba PS, Di Natale G, Flottes ML, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware trojans. In: 2014 IEEE 20th international on-line testing symposium (IOLTS). IEEE, pp 49–54
3. Garg S, Rajendran J (2017) Split manufacturing. In: Hardware Protection through Obfuscation. Springer, pp 243–262
4. Guin U, Forte D, Tehranipoor M (2013) Anticounterfeit techniques: from design to resign. In: 14th international workshop on microprocessor test and verification, MTV 2013, Austin, TX, USA, December 11-13, 2013, pp 89–94
5. Lee YW, Touba NA (2015) Improving logic obfuscation via logic cone analysis. In: 2015 16th Latin-American test symposium (LATS). IEEE, pp 1–6