Return to Article Details Hardware Protection with Security Protocol and Data Model Download Download PDF