Login / Signup

Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions.

Xiaoxiao WangMohammad TehranipoorJim Plusquellic
Published in: HOST (2008)
Keyphrases
  • low cost
  • real time
  • detecting malicious
  • security issues
  • detect malicious
  • computer systems
  • information security
  • security mechanisms
  • key management