Login / Signup

Building the IBM 4758 Secure Coprocessor.

Joan G. DyerMark LindemannRonald PerezReiner SailerLeendert van DoornSean W. SmithSteve H. Weingart
Published in: Computer (2001)
Keyphrases
  • case study
  • access control
  • lightweight
  • security requirements
  • security mechanisms
  • security analysis
  • standard model
  • identity management
  • san jose