MRAM: from STT to SOT, for security and memory.
Mounia Kharbouche-HarrariRana AlhalabiJérémy Postel-PellerinRomain WacquezDriss AboulkassimiEtienne NowakIoan Lucian PrejbeanuGuillaume PrenatGregory di PendinaPublished in: DCIS (2018)
Keyphrases
- random access memory
- access control
- design considerations
- statistical databases
- security issues
- computer security
- information security
- security systems
- memory requirements
- windows xp
- intrusion detection
- computing power
- information assurance
- memory size
- security policies
- network security
- memory usage
- memory space
- security requirements
- security problems
- information systems
- random access
- security mechanisms
- key management
- network management
- security protocols
- external memory
- associative memory
- query processing
- data structure