Login / Signup
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.
Matthew Judge
Paul D. Williams
Yong Kim
Barry E. Mullins
Published in:
WISTP (2008)
Keyphrases
</>
dedicated hardware
computer systems
software development
software systems
hardware implementation
source code
software architecture
machine learning
computer vision
user interface
information sharing
private information
privacy concerns