Overview: This book provides a reader with a deep understanding of logic locking concepts, analytical skills for the quantitative security evaluation of security techniques and prepares then for either applicatWith the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field. Typically, each book chapter is a recompilation of one or more research papers, and the focus is on summarizing the state-of-the-art research.. .Different from the edited monograms, the chapters in this book are not re-compilations
|