Login / Signup
Universally Composable Firewall Architectures Using Trusted Hardware.
Dirk Achenbach
Jörn Müller-Quade
Jochen Rill
Published in:
BalkanCryptSec (2014)
Keyphrases
</>
high end
parallel architectures
computing systems
intrusion detection
intrusion detection system
network traffic
neural network
distributed environment
network security
hardware and software
hardware implementation
processing elements
java card
trusted computing
network connection