Confronting the Limitations of Hardware-Assisted Security.
Mohammad MannanN. AsokanPublished in: IEEE Secur. Priv. (2020)
Keyphrases
- low cost
- random number generator
- hardware and software
- access control
- real time
- computing power
- information security
- security issues
- security mechanisms
- network security
- trusted computing
- security protocols
- security systems
- security policies
- protection scheme
- intrusion detection
- security management
- security problems
- parallel hardware
- windows xp
- protection schemes
- computer security
- security requirements
- massively parallel
- network management
- hardware implementation
- hardware architecture
- security level
- vlsi implementation
- statistical databases
- security measures
- computing systems
- personal computer
- computer systems
- single point of failure
- data mining