Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures.
Zhaoxia DengAriel FeldmanStuart A. KurtzFrederic T. ChongPublished in: ISCA (2017)
Keyphrases
- information security
- statistical databases
- access control
- security policies
- security issues
- security problems
- intrusion detection
- remote server
- security threats
- security systems
- data security
- security requirements
- automatically generate
- network security
- information systems
- critical infrastructure
- low cost
- security level
- website
- security measures
- database