Return to Article Details Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques Download Download PDF