Security primitives (PUF and TRNG) with STT-MRAM.
Elena Ioana VatajeluGiorgio Di NatalePaolo PrinettoPublished in: VTS (2016)
Keyphrases
- intrusion detection
- building blocks
- information assurance
- security systems
- security problems
- information security
- design considerations
- security requirements
- electronic devices
- low level
- functional requirements
- computer security
- distributed systems
- computer networks
- network security
- security policies
- statistical databases
- security issues
- security management
- database
- high level
- security properties
- security level
- security vulnerabilities
- sensitive data
- cyber security
- security analysis
- key management
- security mechanisms
- human operators
- network management
- learning environment
- data mining
- data sets