Login / Signup
Lemonade from Lemons: Harnessing Device Wearout to Create Limited-Use Security Architectures.
Zhaoxia Deng
Ariel Feldman
Stuart A. Kurtz
Frederic T. Chong
Published in:
ISCA (2017)
Keyphrases
</>
information security
statistical databases
access control
security policies
security issues
security problems
intrusion detection
remote server
security threats
security systems
data security
security requirements
automatically generate
network security
information systems
critical infrastructure
low cost
security level
website
security measures
database