Hardware security assurance in emerging IoT applications.
Jaya DofeJonathan FreyQiaoyan YuPublished in: ISCAS (2016)
Keyphrases
- information security
- security problems
- low cost
- random number generator
- hardware and software
- key management
- real time
- security issues
- intrusion detection
- management system
- network security
- security requirements
- trusted computing
- access control
- computer security
- data security
- computer networks
- protection scheme
- cloud computing
- computer systems
- information systems
- data mining
- statistical databases
- image processing
- encryption algorithms
- vlsi implementation
- hardware architecture
- security mechanisms
- massively parallel
- computing systems
- security policies
- data acquisition