Login / Signup
Evaluating the Use of Boot Image Encryption on the TALOS II Architecture.
Calvin Muramoto
Scott R. Graham
Stephen Dunlap
Published in:
Critical Infrastructure Protection (2022)
Keyphrases
</>
image encryption
encryption algorithms
high security
data encryption standard
authentication scheme
image scrambling
image encryption scheme
chaotic maps
image encryption algorithm
wireless communication
security analysis
real time
digital images
e government
software architecture