Strongly bounded termination with applications to security and hardware synthesis.
Thomas N. ReynoldsWilliam L. HarrisonRohit ChadhaGerard AllweinPublished in: TyDe@ICFP (2020)
Keyphrases
- information security
- low cost
- security issues
- real time
- random number generator
- hardware and software
- security requirements
- access control
- network security
- information systems
- security problems
- security management
- trusted computing
- hardware implementation
- intrusion detection
- image processing
- security measures
- windows xp
- security level
- security mechanisms
- computing power
- statistical databases
- security policies
- computer systems
- functional requirements
- computer security
- application level
- security systems
- cyber attacks
- sensitive data
- massively parallel
- security threats
- embedded systems
- protection scheme
- parallel hardware
- signal processing