Linked e-resources
Details
Table of Contents
Demand for Applications Requiring Hardware Security
Desired Security Features
Available Hardware Primitives
Isolated Execution Environments
API Architectures
Analysis and Recommendations
Summary.
Desired Security Features
Available Hardware Primitives
Isolated Execution Environments
API Architectures
Analysis and Recommendations
Summary.