Author:
Ray Sandip,Basak Abhishek,Bhunia Swarup
Publisher
Springer International Publishing
Reference13 articles.
1. L. Bossuet, M. Grand, L. Gaspar, V. Fischer, G. Gogniat, Architectures of flexible symmetric key crypto engines–a survey: from hardware coprocessor to multi-crypto-processor system on chip. ACM Comput. Surv. 45(4), 41:1–41:32 (2013)
2. J.A. Goguen, J. Meseguer, Security policies and security models, in Proceedings of 1982 IEEE Symposium on Security and Privacy (1982), pp. 11–20
3. S.J. Greenwald, Discussion topic: what is the old security paradigm, in Workshop on New Security Paradigms (1998), pp. 107–118
4. U. Guin, D. DiMase, M. Tehranipoor, Counterfeit integrated circuits: detection, avoidance, and the challenges ahead. J. Electron. Test. 30(1), 25–40 (2014)
5. J.T. Haigh, W.D. Young, Extending the non-interference version of MLS for SAT, in Symposium on Security and Privacy (1986)