-based devices for hardware security.
Massimo VatalaroH. NeillF. GityPaolo MagnoneV. MaccaronioC. MárquezJ. C. GaldonF. GamizFelice CrupiP. HurleyR. De RosePublished in: CoRR (2023)
Keyphrases
- embedded systems
- embedded devices
- low cost
- hardware and software
- low end
- processing capabilities
- random number generator
- intrusion detection
- personal computer
- real time
- mobile devices
- information security
- windows xp
- security policies
- security issues
- security requirements
- camera phones
- computer systems
- trusted computing
- wireless sensor
- high end
- security analysis
- hardware platforms
- security level
- computer security
- statistical databases
- image processing
- security mechanisms
- network access
- cyber security
- security protocols
- cyber attacks
- computing platform
- vlsi implementation
- mobile agent system
- hardware software
- reconfigurable hardware
- data acquisition
- operating system
- access control