Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:space2015 [2015-10-22 19:09] – petrs | public:papers:space2015 [2016-12-01 13:28] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
* Conference page: [[http:// | * Conference page: [[http:// | ||
- | * Download author pre-print of the paper: {{: | + | * Download author pre-print of the paper: {{: |
* Download presentation: | * Download presentation: | ||
* Download used source codes: [[https:// | * Download used source codes: [[https:// | ||
Line 22: | Line 22: | ||
} | } | ||
| | ||
- | ---- | + | |
- | ---- | + | |
Line 34: | Line 34: | ||
* yet withstand a skilled attacker with direct physical access to target device. | * yet withstand a skilled attacker with direct physical access to target device. | ||
The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator. | The typical usage scenario is high speed security box in datacenter shared by many users without need for trust put in security box operator. | ||
+ | |||
+ | {{: | ||