Security Evaluations beyond Computing Power.
Nicolas Veyrat-CharvillonBenoît GérardFrançois-Xavier StandaertPublished in: EUROCRYPT (2013)
Keyphrases
- computing power
- computational power
- storage capacity
- processing power
- information security
- embedded systems
- access control
- security policies
- intrusion detection
- memory hierarchy
- security requirements
- statistical databases
- computer security
- multicore processors
- security protocols
- security level
- multi agent
- security issues
- network security
- parallel processing
- general purpose
- security mechanisms
- security systems
- smart card
- computational complexity