Journal
Scientific and technical journal «Priborostroenie»
UDK004.056
Issue:11 (55)
Download PDF477 Kbyte
A configuration technique is proposed to facilitate the design of secure embedded devices. The model enables search for the most effective combinations of security building blocks in terms of consumption of device resources.