Integration of Hardware Security Modules into a Deeply Embedded TLS Stack.
Oliver KehretAndreas WalzAxel SikoraPublished in: Int. J. Comput. (2016)
Keyphrases
- embedded systems
- real time
- security issues
- random number generator
- control software
- hardware and software
- low cost
- hw sw
- security requirements
- information security
- statistical databases
- network security
- access control
- embedded processors
- trusted computing
- modular design
- micro controller
- image processing
- intrusion detection
- computing systems
- computer systems
- building blocks
- computer security
- parameter estimation
- security patterns
- data acquisition
- information systems
- protection scheme
- application level
- key management
- security mechanisms
- functional requirements
- smart card
- hardware implementation