Results 251 to 260 of about 33,830 (312)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby Lee +2 more
openaire +1 more source
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby Lee +2 more
openaire +1 more source
IEEE Embedded Systems Letters
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti +1 more
openaire +2 more sources
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti +1 more
openaire +2 more sources
2023
Organizations employ a growing volume of machine identities, often numbering in the thousands or millions per organization. Machine identities, such as secret cryptographic keys, can be used to identify which policies need to be enforced for each machine. Centralized management of machine identities
Michael Bartock +5 more
openaire +1 more source
Organizations employ a growing volume of machine identities, often numbering in the thousands or millions per organization. Machine identities, such as secret cryptographic keys, can be used to identify which policies need to be enforced for each machine. Centralized management of machine identities
Michael Bartock +5 more
openaire +1 more source
Proceedings of the 2014 on International symposium on physical design, 2014
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
The attacks targeting hardware range from IP piracy to data theft to intentional hardware compromise and sabotage. Of particular concern are systemic, or combined, attacks that include both software and hardware elements: as the secure computing architectures, such as Intel TPM or ARM TrustZone, become more common, their hardware-based trust anchors ...
openaire +1 more source
2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
2010
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Ted Huffmire +5 more
openaire +1 more source
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Ted Huffmire +5 more
openaire +1 more source
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging applications, for instance in IoT area, increasingly involve large numbers of connected and heterogeneous ...
openaire +1 more source
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging applications, for instance in IoT area, increasingly involve large numbers of connected and heterogeneous ...
openaire +1 more source

