Hardware security through chain assurance.
Yaw S. ObengColm NolanDavid BrownPublished in: DATE (2016)
Keyphrases
- information security
- low cost
- security issues
- hardware and software
- computer security
- information assurance
- random number generator
- real time
- network security
- trusted computing
- security problems
- computer systems
- intrusion detection
- security requirements
- access control
- security systems
- information systems
- hardware implementation
- personal computer
- security threats
- protection scheme
- data acquisition
- security policies
- statistical databases
- computing power
- security analysis
- security protocols
- security management