Secure embedded system hardware design - A flexible security and trust enhanced approach.
Apostolos P. FournarisNicolas SklavosPublished in: Comput. Electr. Eng. (2014)
Keyphrases
- hardware design
- security services
- trusted computing
- security requirements
- security issues
- public key infrastructure
- security mechanisms
- security level
- security protocols
- security measures
- key management
- security management
- smart card
- hardware implementation
- trust relationships
- security model
- security analysis
- fpga hardware
- security properties
- information security
- data encryption
- sensitive data
- electronic transactions
- data security
- cryptographic protocols
- access control
- encryption scheme
- authentication mechanism
- diffie hellman
- integrity verification
- identity management
- user authentication
- trust management
- digital signature
- authentication protocol
- personal information
- digital rights management
- stream cipher
- key exchange protocol
- private key
- cloud computing
- public key cryptography
- field programmable gate array
- key agreement protocol
- trust negotiation
- public key
- pattern recognition
- operating system
- computing environments
- general purpose
- fine grained
- information systems
- key distribution
- privacy preserving
- efficient implementation
- embedded systems
- security policies
- real time