IC activation and user authentication for security-sensitive systems | IEEE Conference Publication | IEEE Xplore