JTAG Security System Based on Credentials.
Keunyoung ParkSang Guun YooTaejun KimJuho KimPublished in: J. Electron. Test. (2010)
Keyphrases
- access control
- trust negotiation
- intrusion detection
- data security
- information security
- security policies
- information assurance
- security properties
- security issues
- network security
- security requirements
- functional requirements
- cryptographic protocols
- security threats
- security management
- user privacy
- security vulnerabilities
- critical information
- security services
- access control policies
- elliptic curve
- database
- network management
- statistical databases
- privacy preserving
- neural network