Results 231 to 240 of about 526,457 (288)
Some of the next articles are maybe not open access.

Virtualization and Hardware-Based Security

IEEE Security and Privacy, 2008
Hypervisors allow virtualization at the hardware level. These technologies have security-related strengths as well as weaknesses. The authors examine emerging hardware and software virtualization technologies in the context of modern computing environments and requirements.
Ronald Perez, Reiner Sailer
exaly   +2 more sources

Hardware enhanced security

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby B. Lee   +2 more
openaire   +1 more source

Standards for Hardware Security

GetMobile: Mobile Computing and Communications, 2019
Due to the globalization of design, manufacturing and distribution of integrated circuits (ICs), hardware underlying information systems have become increasingly vulnerable to a number of malicious attacks, primarily counterfeiting of ICs and piracy of intellectual properties (IPs).
Ujjwal Guin   +2 more
openaire   +1 more source

Hardware security in VLSI

Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, 2011
This special session addresses the increasingly critical area of hardware security in VLSI. As computing becomes ubiquitous, most systems need to implement various layers of security, all of which rely on the security of the underlying hardware. At the same time, persistent trends in VLSI are producing challenges and opportunities in the design of ...
Wayne P. Burleson, Yusuf Leblebici
openaire   +1 more source

Hardware cyber security

Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire   +1 more source

Hardware implementation of bluetooth security

IEEE Pervasive Computing, 2003
Bluetooth can implement its security layer's key-generation mechanism and authentication in software or hardware. Software implementation usually satisfies user requirements, but in time-critical applications or processing-constrained devices, a hardware implementation is preferable.
Paraskevas Kitsos   +3 more
openaire   +1 more source

Challenges and Methodologies of Hardware Security

2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), 2018
An attack on hardware typically results in a severer and difficult-to-recover damage, hence, it is our interest to focus this work on hardware security. A brief survey of security issues found in various application domains is presented, based on a collection of over seventy papers in IEEE Xplore archived since 2011.
Kin Fun Li, Narges Attarmoghaddam
openaire   +1 more source

Verifiable Security Templates for Hardware

2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020
High-level synthesis (HLS) research generally focuses on transferring "software engineering virtues" (e.g., modularity, abstraction, extensibility, etc.) to hardware development with the ultimate goal of making hardware development as agile as software development.
William L. Harrison, Gerard Allwein
openaire   +1 more source

Hardware-Level Secure Coding

IEEE Embedded Systems Letters
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy