Login / Signup
Secure Architectures.
Lizy Kurian John
Published in:
IEEE Micro (2019)
Keyphrases
</>
key distribution
lightweight
security issues
security requirements
data sets
key management
security analysis
security level
scalar product
security protocols
digital signature
cryptographic protocols
authentication scheme
neural architectures