![]() | Hardware-based encryption is currently a Computing and engineering good article nominee. Nominated by ∰Bellezzasolo✡ Discuss at 15:32, 27 January 2018 (UTC) An editor has indicated a willingness to review the article in accordance with the good article criteria and will decide whether or not to list it as a good article. Comments are welcome from any editor who has not nominated or contributed significantly to this article. This review will be closed by the first reviewer. To add comments to this review, click discuss review and edit the page.
|
This is the talk page for discussing improvements to the Hardware-based encryption article. This is not a forum for general discussion of the subject of the article. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||
|
![]() | This article is written in British English, which has its own spelling conventions (colour, travelled, centre, defence, artefact, analyse) and some terms may be different or absent from other varieties of English. According to the relevant style guide, this should not be changed without broad consensus. |
![]() | A fact from Hardware-based encryption appeared on Wikipedia's Main Page in the Did you know column on 11 February 2018 (check views). The text of the entry was as follows:
| ![]() |