Login / Signup
Security Testing for Hardware Products: The Security Evaluations Practice.
Alain Merle
Jessy Clédière
Published in:
IOLTS (2005)
Keyphrases
</>
security issues
information security
security policies
intrusion detection
network security
security requirements
security mechanisms
real time
statistical databases
security systems
trusted computing
computer security
security analysis
security level
java card
security measures
random number generator