Results 91 to 100 of about 522,408 (289)
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Hardware Assisted Security Platform [PDF]
Embedded systems are often used to monitor and control various dynamic and complex applications. However, with greater accessibility and added features on many embedded systems, more and more systems are being subject to sophisticated and new types of attacks.
openaire +1 more source
Fabric‐Based Wearable Robotic Exoskeleton Gloves: Advancements and Challenges
This review highlights interdisciplinary technological advances in fabric‐based robotic gloves, focusing on progress in design, fabrication, actuation, sensing, control, and power and energy requirements. It also addresses performance testing and validation, including biomechanical, strength, functional, user experience, and durability assessments, to ...
Ayse Feyza Yilmaz +2 more
wiley +1 more source
A memristor fingerprinting and characterisation methodology for hardware security. [PDF]
Aitchison C +3 more
europepmc +1 more source
We developed a flexible multi‐material printing strategy that employs sequential printing with different printers. This combined use of printers expands the accessible material scope. Moreover, incorporating Xolography as a sequential step enables support‐free, contactless printing, thereby enhancing structural design flexibility beyond conventional ...
Kun Zhou, Cyrille Boyer
wiley +1 more source
A RRAM-Based True Random Number Generator with 2T1R Architecture for Hardware Security Applications. [PDF]
Peng B, Wu Q, Wang Z, Yang J.
europepmc +1 more source
Tunable Applicator for Microneedle‐Based Medical Devices
This paper presents a simple, low‐cost tunable applicator (TAPP) for microneedle array patches that uses a material‐agnostic controlled‐fracture mechanism to ensure reliable skin penetration and uniform array engagement. The scalable, modular design is compatible with injection molding and 3D printing, can be integrated directly into patches, and is ...
Dan Ilyn +9 more
wiley +1 more source
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
openaire +1 more source
ABSTRACT Quantifying oral polymorphonuclear neutrophils (oPMNs) is a clinically validated approach for assessing periodontal inflammation. However, current methods, such as manual hemocytometry and flow cytometry, are time‐consuming (>3 h), require invasive sampling, and depend on staining and complex instrumentation, making them unsuitable for point ...
Mohsen Hassani +9 more
wiley +1 more source

