Login / Signup
Memory encryption: A survey of existing techniques.
Michael Henson
Stephen Taylor
Published in:
ACM Comput. Surv. (2013)
Keyphrases
</>
memory requirements
memory usage
encryption algorithms
case based reasoning
computing power
limited memory
database
databases
information retrieval
website
main memory
computational power
encryption scheme
information hiding
multimedia streaming