2015
DOI: 10.1007/978-3-319-25645-0_31
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographically Secure On-Chip Firewalling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The DetectANN component is used for HT detection, the Bypass Channel is used for passing high-security packets, and SmartRoute Controller chooses one of the three available routing algorithms. malicious requesting IP/router, so-called an Initiator, targets the valuable data assets to achieve the following goals [90]:…”
Section: E Access Authorizationmentioning
confidence: 99%
See 3 more Smart Citations
“…The DetectANN component is used for HT detection, the Bypass Channel is used for passing high-security packets, and SmartRoute Controller chooses one of the three available routing algorithms. malicious requesting IP/router, so-called an Initiator, targets the valuable data assets to achieve the following goals [90]:…”
Section: E Access Authorizationmentioning
confidence: 99%
“…Memory is divided into regions, and each island can only access its dedicated address range. Few dynamic firewalls have been proposed in the literature [90], [92], [96]. Cioranesco et al [90] argue that authenticated encryption between the initiator and the target imposes a significant latency overhead.…”
Section: [93]-mentioning
confidence: 99%
See 2 more Smart Citations