Simulation based verification of concurrent processing on security devices.
Maurizio TalamoMaulahikmah GaliniumChristian H. SchunckFranco ArcieriPublished in: SysCon (2013)
Keyphrases
- high security
- java card
- information security
- real time
- processing capabilities
- neural network
- security issues
- security policies
- network security
- embedded systems
- information processing
- access control
- intrusion detection
- computer security
- data processing
- cryptographic protocols
- security problems
- key management
- low cost
- mobile devices
- integrity verification