|
Volumn , Issue , 1990, Pages 333-344
|
Verifying a hardware security architecture
a a |
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTOMATA THEORY;
COMPUTER ARCHITECTURE;
COMPUTER HARDWARE;
COMPUTER SOFTWARE;
EVENT HISTORIES;
HARDWARE SECURITY ARCHITECTURE;
SECURE COMPUTING SYSTEM;
SOFTWARE SUPPORT;
DATA PROCESSING;
|
EID: 0025111912
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/risp.1990.63862 Document Type: Conference Paper |
Times cited : (1)
|
References (18)
|