Login / Signup

A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software.

Giovanni AgostaAlessandro BarenghiGerardo PelosiMichele Scandale
Published in: DAC (2014)
Keyphrases
  • embedded software
  • security protocols
  • artificial intelligence
  • embedded systems
  • key management
  • database
  • real time
  • sequence diagrams