Security Vs Design Cost of Signature Driven Security Methodologies for Reusable Hardware IP Core.
Rahul ChaurasiaAnirban SenguptaPublished in: iSES (2022)
Keyphrases
- functional requirements
- access control
- information security
- security requirements
- design process
- user interface
- computer security
- security issues
- intrusion detection
- statistical databases
- embedded systems
- low cost
- security mechanisms
- real time
- random number generator
- ring signature scheme
- security policies
- rfid tags
- security protocols
- circuit design
- hardware design
- single chip
- digital circuits
- digital copyright protection