R. Sree Ranjani

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In today's scenario, any design is vulnerable to third party attackers like Hardware Trojan depends on their accessibility to the design. Hardware Trojans are the pernicious circuitry which are added to an original design by an attacker. These Trojans may lead to erroneous output of a system or even can incapacitate the design. Hence there is a demand for(More)
  • 1