Post-deployment trust evaluation in wireless cryptographic ICs | IEEE Conference Publication | IEEE Xplore