hardware security (Q3749): Difference between revisions
Jump to navigation
Jump to search
Created a new Item: hardware security, discipline involving hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure |
Created claim: subclass of (P1): security (Q2060) |
||
| (One intermediate revision by the same user not shown) | |||
| Property / instance of | |||
| Property / instance of: type of security / rank | |||
Normal rank | |||
| Property / subclass of | |||
| Property / subclass of: security / rank | |||
Normal rank | |||
Latest revision as of 14:54, 26 February 2023
discipline involving hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | hardware security |
discipline involving hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure |