Trustworthy System Security through 3-D Integrated Hardware.
Ted HuffmireJonathan ValamehrTimothy SherwoodRyan KastnerTimothy E. LevinThuy D. NguyenCynthia E. IrvinePublished in: HOST (2008)
Keyphrases
- access control
- hardware and software
- real time
- low cost
- computer security
- information security
- random number generator
- computer systems
- trust management
- security systems
- trusted computing
- security requirements
- security issues
- hardware implementation
- network security
- intrusion detection
- information assurance
- image processing
- statistical databases
- data integrity
- security threats
- vlsi implementation
- computing power
- security policies
- protection schemes