Abstract
This paper explores the use of hardware sandboxes, conceptually similar to software sandboxes, for secure integration of non-trusted IPs in systems-on......
小提示:本篇文献需要登录阅读全文,点击跳转登录