Login / Signup
Vulnerability-tolerant secure architectures.
Todd M. Austin
Valeria Bertacco
Baris Kasikci
Sharad Malik
Mohit Tiwari
Published in:
ICCAD (2018)
Keyphrases
</>
security issues
neural architectures
cryptographic protocols
security level
covert channel
multi party
authentication scheme
security analysis
identity management
group communication
key distribution
data mining
security mechanisms
sensitive data
security requirements
risk assessment
search engine