Login / Signup
Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM.
Yaroslav Sovyn
Volodymyr Khoma
Michal Podpora
Published in:
IEEE Internet Things J. (2020)
Keyphrases
</>
intrusion detection
security problems
information systems
access control
security requirements
key management
security systems
encryption algorithms
wireless sensor networks
co occurrence
cloud computing
security policies
secret key
security analysis
encryption algorithm
encryption decryption