Anti-counterfeiting with hardware intrinsic security.
Vincent van der LeestPim TuylsPublished in: DATE (2013)
Keyphrases
- security protection
- information security
- low cost
- random number generator
- hardware and software
- real time
- computer security
- security issues
- security policies
- hardware implementation
- security requirements
- image processing
- information assurance
- access control
- computer systems
- security problems
- security level
- protection schemes
- windows xp
- parallel hardware
- trusted computing
- security threats
- intrusion detection
- statistical databases
- embedded systems
- geometric structure
- personal computer
- cyber security
- key management
- computing power
- security measures
- privacy protection
- operating system
- encryption algorithms