Login / Signup

Java cryptography on KVM and its performance and security optimization using HW/SW co-design techniques.

Yusuke MatsuokaPatrick SchaumontKris TiriIngrid Verbauwhede
Published in: CASES (2004)
Keyphrases
  • operating system
  • hw sw
  • information security
  • hardware software
  • embedded systems
  • programming language
  • access control
  • design methodology
  • open source
  • neural network
  • object oriented
  • source code
  • computing systems