In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Lejla BatinaPatrick JauernigNele MentensAhmad-Reza SadeghiEmmanuel StapfPublished in: DAC (2019)
Keyphrases
- hardware and software
- low cost
- trusted computing
- real time
- random number generator
- computer systems
- massively parallel
- intrusion detection
- data acquisition
- information security
- vlsi implementation
- computing power
- hardware architecture
- hardware implementation
- application level
- hardware design
- statistical databases
- access control
- information systems