Results 61 to 70 of about 776,400 (220)

NC-ROLL-FIA: Negative capacitance FET based designs for robust logic locking against fault injection attacks enabling trustworthy hardware for edge AI devices

open access: yesResults in Engineering
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao   +5 more
doaj   +1 more source

Concerted Wire Lifting: Enabling Secure and Cost-Effective Split Manufacturing

open access: yes, 2018
Here we advance the protection of split manufacturing (SM)-based layouts through the judicious and well-controlled handling of interconnects. Initially, we explore the cost-security trade-offs of SM, which are limiting its adoption.
Ashraf, Mohammed   +3 more
core   +1 more source

Viscoelastic Behaviors of Hyaluronic Derivatives as a Function of pH, Salt, and Temperature

open access: yesJournal of Polymer Science, EarlyView.
Viscoelastic properties of hyaluronic acid grafted with polyether side‐chains (HA‐PEPO) can be controlled in aqueous media over more than three decades of amplitude with the possibility to get liquid or gel states, regardless of temperature, as well as sol/gel transitions induced by cooling or heating by the interplay between hydrogen bonds ...
Yogesh Kadam   +6 more
wiley   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

x64Unpack: Hybrid Emulation Unpacker for 64-bit Windows Environments and Detailed Analysis Results on VMProtect 3.4

open access: yesIEEE Access, 2020
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult.
Seokwoo Choi   +3 more
doaj   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Not All That Glitters Is Gold! The Brokerage Role of Consulting Companies in Disseminating Information to Overcome the Barriers to Metaverse Adoption

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno   +2 more
wiley   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

CONSULTANCY STATE: Government as (a) Service and the Anti‐politics of Technological Expertise in Indian Cities

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract This article analyses ideas of ‘good governance through technology’ in India that first emerged from the software industry, symbolizing state support for the ‘new middle‐class’ values of liberalized private enterprise. We suggest that the contemporary prominence of consulting firms in government represents a second transformation that embeds ...
Matt Birkinshaw, Sanjay Srivastava
wiley   +1 more source

Home - About - Disclaimer - Privacy