Verification of Authenticated Firmware Load.
Sujit Kumar MuduliPramod SubramanyanSayak RayPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- power consumption
- load balancing
- operating system
- computer systems
- authentication scheme
- data sets
- highly modular
- key exchange protocol
- key agreement protocol
- load forecasting
- formal verification
- face verification
- neural network
- signature verification
- data processing
- database systems
- information systems
- verification method
- concurrent systems
- artificial intelligence
- real time
- password based authenticated key exchange