Results 241 to 250 of about 526,457 (288)
Some of the next articles are maybe not open access.

Hardware Intrinsic Security

2010
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire   +1 more source

Improving Hardware Security for LoRaWAN

2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019
The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. LoRaWAN is one of the most outstanding technologies for massive IoT communications due to features such as large coverage and low power consumption. In this
Jorge Navarro-Ortiz   +3 more
openaire   +1 more source

Hardware Security of CE Devices [Hardware Matters]

IEEE Consumer Electronics Magazine, 2017
In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores.
openaire   +1 more source

Hardware Encapsulation of Security Services

2003
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty.
Adrian Baldwin, Simon Shiu
openaire   +1 more source

New Directions in Hardware Security

2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), 2016
Summary form only. Over the last decade, Hardware Security has developed to become one of the major research areas in Electronics and Computer Engineering and Computer Science. Hardware Security research deals with cutting-edge problems and their solutions in the domains of Detection and Prevention against Hardware Trojans, Counterfeit Electronics ...
openaire   +1 more source

A novel ROPUF for hardware security

2015 19th International Symposium on VLSI Design and Test, 2015
Physical Unclonable Functions (PUFs) are promising security primitives in recent times. A PUF is a die-specific random function or silicon biometric that is unique for every instance of the die. PUFs derive their randomness from the uncontrolled random variations in the IC manufacturing process which is used to generate cryptographic keys.
Sauvagya Ranjan Sahoo   +2 more
openaire   +1 more source

Security design considerations of hardware

Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge - ACM 84, 1984
Traditionally, computer hardware have been designed independent of the total system's approach. Central processing units can usually provide protection under software and firmware control, but do not provide for software copy protection and data integrity automatically. Storage devices and peripherals have been built to receive and transmit information
openaire   +1 more source

Hardware Security Primitives for Vehicles

IEEE Consumer Electronics Magazine, 2019
In the last few decades, advances in vehicular technology have necessitated large increases in the number of Electronic Control Units (ECUs) within vehicles. These ECUs are required to communicate with other ECUs in order to achieve full functionality.
Carson Labrado, Himanshu Thapliyal
openaire   +1 more source

Verifying a hardware security architecture

Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990
The verification work reported had three goals: (1) to develop a method for specifying components, which may be either software processes or hardware components, in terms of their possible event histories (also called traces); (2) to develop a method of verifying systems built from such components; and (3) to use these techniques to prove security ...
Joshua D. Guttman, H.-P. Ko
openaire   +1 more source

Hardware security and split fabrication

2016 11th International Design & Test Symposium (IDT), 2016
As hardware system designers include third party IPs in their designs and outsource the fabrication to off-shore facilities, hardware security threats are becoming more serious. Threats include the overbuilding and malicious circuit insertion at the foundry during fabrication.
openaire   +1 more source

Home - About - Disclaimer - Privacy