Using emerging technologies for hardware security beyond PUFs.
An ChenXiaobo Sharon HuYier JinMichael T. NiemierXunzhao YinPublished in: DATE (2016)
Keyphrases
- emerging technologies
- low cost
- e learning
- user experience
- random number generator
- mobile learning
- information security
- access control
- learning technologies
- development tools
- security requirements
- security issues
- statistical databases
- intrusion detection
- hardware and software
- computer systems
- trusted computing
- network security
- security policies
- image processing
- protection scheme
- knowledge society
- windows xp
- real time
- hardware implementation
- data acquisition
- security analysis
- computer security
- embedded systems
- artificial intelligence
- machine learning
- databases