Fig. 5From: Software control and intellectual property protection in cyber-physical systemsRepresentation of a k-bit multiplierBack to article page