Sign in

A Design of Security Module to Protect Program Execution in Embedded System.

Xiang WangZexi ZhaoYing LuYi Zhang
Published in: GreenCom/iThings/CPScom (2013)
Keyphrases
  • program execution
  • design process
  • case study
  • functional requirements
  • data encryption
  • artificial intelligence
  • multi agent systems
  • access control
  • security issues
  • security requirements
  • multi processor