Hardware authentication leveraging performance limits in detailed simulations and emulations.
Daniel Y. DengAndrew H. ChanG. Edward SuhPublished in: DAC (2009)
Keyphrases
- low cost
- hardware and software
- real time
- hardware implementation
- computing power
- computer systems
- hardware design
- personal computer
- massively parallel
- image processing
- fragile watermarking
- integrity verification
- numerical simulations
- security requirements
- computational power
- security analysis
- embedded systems
- user authentication
- image authentication
- data encryption
- simulation model