SHIELDSTRAP: Making secure processors truly secure.
Siddhartha ChhabraBrian RogersYan SolihinPublished in: ICCD (2009)
Keyphrases
- security issues
- security requirements
- security management
- cryptographic protocols
- security analysis
- real time
- security protocols
- security measures
- user authentication
- key distribution
- digital signature
- authentication protocol
- standard model
- key management
- security mechanisms
- sensitive data
- parallel processing
- neural network