Strategies on security control of T/R modules | IEEE Conference Publication | IEEE Xplore