Results 61 to 70 of about 776,400 (220)
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao +5 more
doaj +1 more source
Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing
Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption.
Ashraf, Mohammed +3 more
core +1 more source
Viscoelastic Behaviors of Hyaluronic Derivatives as a Function of pH, Salt, and Temperature
Viscoelastic properties of hyaluronic acid grafted with polyether side‐chains (HA‐PEPO) can be controlled in aqueous media over more than three decades of amplitude with the possibility to get liquid or gel states, regardless of temperature, as well as sol/gel transitions induced by cooling or heating by the interplay between hydrogen bonds ...
Yogesh Kadam +6 more
wiley +1 more source
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier +3 more
doaj +1 more source
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi +3 more
doaj +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno +2 more
wiley +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Abstract This article analyses ideas of ‘good governance through technology’ in India that first emerged from the software industry, symbolizing state support for the ‘new middle‐class’ values of liberalized private enterprise. We suggest that the contemporary prominence of consulting firms in government represents a second transformation that embeds ...
Matt Birkinshaw, Sanjay Srivastava
wiley +1 more source

