Innovative practices session 3C hardware security.
J. V. RajendranPeilin SongSuriya NatarajanPublished in: VTS (2017)
Keyphrases
- computing systems
- computer systems
- case study
- computing platform
- security policies
- security issues
- intrusion detection
- information security
- cyber security
- low cost
- hardware and software
- access control
- security requirements
- network security
- statistical databases
- real time
- security systems
- random number generator
- hardware implementation
- cyber attacks
- trusted computing
- encryption algorithms