Usability in a Mixed Cryptography and Hardware Security System.
Bárbara Emma Sánchez-RinzaCarlos Ignacio Robledo SánchezMario Rossainz LopezPublished in: CLIHC (2023)
Keyphrases
- information security
- encryption algorithms
- random number generator
- security issues
- hardware and software
- cellular automata
- low cost
- security requirements
- intrusion detection
- hardware implementation
- elliptic curve cryptography
- network security
- public key cryptography
- real time
- image processing
- protection scheme
- computing systems
- computer systems
- data acquisition
- security protocols
- security policies
- cryptographic algorithms
- public key
- computer security
- security analysis
- application level
- security systems
- trusted computing
- embedded systems
- smart card