sri krishna yadav
Newbie level 5
Hi everybody, I am doing research in security in embedded systems. I am trying to make out the differences between the security methods (example: user authentication methods) followed in embedded systems and in conventional computer systems. i am not able get the matter on it. please suggest me any document or anything regarding this. thank you in advance