Security constraints in integrated circuits | IEEE Conference Publication | IEEE Xplore