Security Implications of Third-Party Accelerators.
Lena E. OlsonSimha SethumadhavanMark D. HillPublished in: IEEE Comput. Archit. Lett. (2016)
Keyphrases
- third party
- sensitive data
- data security
- personal data
- trusted third party
- sensitive information
- personal information
- security issues
- outsourced databases
- information security
- data privacy
- reverse logistics
- key management
- privacy issues
- access control
- security requirements
- private information
- security mechanisms
- computing platform
- statistical databases
- security analysis
- security protocols
- computing systems
- elliptic curve