![]() ![]() The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. ![]() Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Introduction to Hardware Security and TrustĮditors Mohammad Tehranipoor ECE Department University of Connecticut 371 Fairfield Way, Unit 2157 Storrs, CT 06269 USA Ĭliff Wang Computing and Information Science Division US Army Research Office PO Box 12211 Research Triangle Park NC 27709-2211 USA
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |