Results 241 to 250 of about 526,457 (288)
Some of the next articles are maybe not open access.
2010
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +1 more source
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +1 more source
Improving Hardware Security for LoRaWAN
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. LoRaWAN is one of the most outstanding technologies for massive IoT communications due to features such as large coverage and low power consumption. In this
Jorge Navarro-Ortiz +3 more
openaire +1 more source
Hardware Security of CE Devices [Hardware Matters]
IEEE Consumer Electronics Magazine, 2017In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores.
openaire +1 more source
Hardware Encapsulation of Security Services
2003Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty.
Adrian Baldwin, Simon Shiu
openaire +1 more source
New Directions in Hardware Security
2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), 2016Summary form only. Over the last decade, Hardware Security has developed to become one of the major research areas in Electronics and Computer Engineering and Computer Science. Hardware Security research deals with cutting-edge problems and their solutions in the domains of Detection and Prevention against Hardware Trojans, Counterfeit Electronics ...
openaire +1 more source
A novel ROPUF for hardware security
2015 19th International Symposium on VLSI Design and Test, 2015Physical Unclonable Functions (PUFs) are promising security primitives in recent times. A PUF is a die-specific random function or silicon biometric that is unique for every instance of the die. PUFs derive their randomness from the uncontrolled random variations in the IC manufacturing process which is used to generate cryptographic keys.
Sauvagya Ranjan Sahoo +2 more
openaire +1 more source
Security design considerations of hardware
Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge - ACM 84, 1984Traditionally, computer hardware have been designed independent of the total system's approach. Central processing units can usually provide protection under software and firmware control, but do not provide for software copy protection and data integrity automatically. Storage devices and peripherals have been built to receive and transmit information
openaire +1 more source
Hardware Security Primitives for Vehicles
IEEE Consumer Electronics Magazine, 2019In the last few decades, advances in vehicular technology have necessitated large increases in the number of Electronic Control Units (ECUs) within vehicles. These ECUs are required to communicate with other ECUs in order to achieve full functionality.
Carson Labrado, Himanshu Thapliyal
openaire +1 more source
Verifying a hardware security architecture
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990The verification work reported had three goals: (1) to develop a method for specifying components, which may be either software processes or hardware components, in terms of their possible event histories (also called traces); (2) to develop a method of verifying systems built from such components; and (3) to use these techniques to prove security ...
Joshua D. Guttman, H.-P. Ko
openaire +1 more source
Hardware security and split fabrication
2016 11th International Design & Test Symposium (IDT), 2016As hardware system designers include third party IPs in their designs and outsource the fabrication to off-shore facilities, hardware security threats are becoming more serious. Threats include the overbuilding and malicious circuit insertion at the foundry during fabrication.
openaire +1 more source

