Fig. 3From: Software control and intellectual property protection in cyber-physical systemsRepresentation of a 1-bit full adderBack to article page