Sign in
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
Jingqiang Lin
Bo Luo
Le Guan
Jiwu Jing
Published in:
IEEE Secur. Priv. (2016)
Keyphrases
</>
optimal solution
data sets
lessons learned
real world
information technology
data mining
key issues
security issues
security requirements
practical solutions
case study
lightweight
real time
technical challenges
security analysis
specific problems
security level