Keyphrases
- parallel implementation
- security requirements
- neural network
- trusted computing
- training process
- security issues
- identity management
- field programmable gate array
- standard model
- factor authentication
- databases
- data encryption
- secure communication
- security properties
- security analysis
- key management
- security mechanisms
- sensitive data
- highly efficient
- low cost
- data mining