Maximizing randomness in ring oscillators for security applications.
Ülkühan GülerGünhan DündarPublished in: ECCTD (2011)
Keyphrases
- information security
- electronic voting
- security policies
- ring signature
- ring signature scheme
- security issues
- access control
- security requirements
- information assurance
- security level
- intrusion detection
- communication systems
- security mechanisms
- computer security
- data security
- security model
- information systems
- security vulnerabilities
- security threats
- security problems
- biometric systems
- critical infrastructure
- data integrity
- key management
- encryption scheme
- statistical databases