Results 281 to 290 of about 522,468 (334)
Some of the next articles are maybe not open access.
2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
2010
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Ted Huffmire +5 more
openaire +1 more source
This chapter discusses the problem of malicious hardware, or gateware, on FPGAs. Categories of malicious hardware, the problem of foundry trust, and attacks facilitated by malicious inclusions are presented. This chapter also explains the problem of covert channels on FPGAs, with a formal definition of a covert channel in general and a description of ...
Ted Huffmire +5 more
openaire +1 more source
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging applications, for instance in IoT area, increasingly involve large numbers of connected and heterogeneous ...
openaire +1 more source
Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern IT systems, and particularly secure the insecure legacy software. Emerging applications, for instance in IoT area, increasingly involve large numbers of connected and heterogeneous ...
openaire +1 more source
2010
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +1 more source
Counterfeiting of electronic goods and stealing of valuable and sensitive data has become a massive problem for companies, the economy and even the security of modern societies. In order to deal with these issues more and more security measures have to be put in place both at the system level as well as the device level.
openaire +1 more source
Computer Fraud & Security, 2004
Abstract The Internet is a polluted place, infested by viruses and over-populated by unsolicited junk such as spam and popups. While in theory there exist all the tools we need to protect ourselves from these nuisances and risks, in practice it is impossible for most casual users and for many companies to steer clear of them.
openaire +1 more source
Abstract The Internet is a polluted place, infested by viruses and over-populated by unsolicited junk such as spam and popups. While in theory there exist all the tools we need to protect ourselves from these nuisances and risks, in practice it is impossible for most casual users and for many companies to steer clear of them.
openaire +1 more source
Hardware Security of CE Devices [Hardware Matters]
IEEE Consumer Electronics Magazine, 2017In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores.
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly

