Sign in
Comparative Study of Persistently Secure Non-Volatile Processors Towards Designing Secure IoT Devices.
Shyamala Palanisamy
Mimi Xie
Published in:
IGSC (Workshops) (2020)
Keyphrases
</>
comparative study
key management
security analysis
data storage
management system
parallel algorithm
security issues
security requirements
mobile devices
cryptographic protocols
authentication scheme
rfid systems
data encryption