Attacks on Physically-Embedded Data Encryption for Embedded Devices.
Chaohui DuGuoqiang BaiPublished in: TrustCom (2014)
Keyphrases
- embedded devices
- data encryption
- embedded systems
- security protocols
- low cost
- data confidentiality
- mobile devices
- watermarking technique
- watermarking algorithm
- encryption algorithm
- software systems
- data sets
- data storage
- data hiding
- resource constrained
- security mechanisms
- limited memory
- data quality
- flash memory
- data model