Login / Signup
Tamper Evident Microprocessors.
Adam Waksman
Simha Sethumadhavan
Published in:
IEEE Symposium on Security and Privacy (2010)
Keyphrases
</>
personal computer
computing power
instruction set
computer architecture
single chip
digital watermarking
machine learning
security level
forward secure
case study
image segmentation
security properties