Login / Signup
Network-on-Chip Trust Validation Using Security Assertions.
Aruna Jayasena
Binod Kumar
Subodha Charles
Hasini Witharana
Prabhat Mishra
Published in:
J. Hardw. Syst. Secur. (2022)
Keyphrases
</>
end to end
network on chip
intrusion detection
information security
routing algorithm
network security
multi processor
access control
security policies
image processing
anomaly detection
network management
data transfer
security mechanisms
security protocols