Login / Signup

Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals.

Yier JinXiaolong GuoRaj Gautam DuttaMohammad-Mahdi BidmeshkiYiorgos Makris
Published in: IEEE Trans. Inf. Forensics Secur. (2017)
Keyphrases
  • information flow
  • real time
  • data sets
  • computer systems
  • database
  • data analysis
  • data processing
  • low cost
  • data acquisition
  • data mining
  • data mining techniques
  • computer networks
  • data quality