Providing secure execution environments with a last line of defense against Trojan circuit attacks.
Gedare BloomBhagirath NarahariRahul SimhaJoseph ZambrenoPublished in: Comput. Secur. (2009)
Keyphrases
- security protocols
- secure routing
- security mechanisms
- cryptographic protocols
- stream cipher
- countermeasures
- ddos attacks
- chosen plaintext
- defense mechanisms
- security measures
- high speed
- dynamic environments
- circuit design
- unauthorized access
- information leakage
- line segments
- cryptographic algorithms
- highly dynamic environments
- resource constrained
- security issues
- computing environments