Hardware Security at the Limit: Nuclear Verification and Arms Control.
Alexander GlaserPublished in: ASHES@CCS (2018)
Keyphrases
- low cost
- real time
- high security
- model checking
- security requirements
- control system
- control program
- java card
- security issues
- trusted computing
- control unit
- information security
- data acquisition
- computer security
- cryptographic protocols
- security level
- hardware designs
- random number generator
- wireless sensor networks
- access control
- computer systems
- anomaly detection
- intrusion detection
- network security
- situational awareness
- security systems
- security mechanisms
- hardware implementation
- control method