Hardware Encryption as an Alternative