Communication Security between a Computer and a Hardware Token.
HongQian Karen LuAsad M. AliPublished in: ICONS (2008)
Keyphrases
- computer systems
- information processing systems
- windows xp
- computer hardware
- communication systems
- hardware and software
- communication protocols
- personal computer
- digital computer
- random number generator
- secure communication
- data acquisition
- information security
- computer security
- information sharing
- physical layer
- real time
- low cost
- computer architecture
- operating system
- cyber physical systems
- computing systems
- security policies
- security requirements
- trusted computing
- key management
- network communication
- security issues
- communication protocol
- resource constrained
- massively parallel
- network management
- communication networks
- computer networks
- intrusion detection
- access control
- hardware architecture
- hardware implementation
- monitoring system
- advanced encryption standard