Results 281 to 290 of about 2,442,732 (352)
Some of the next articles are maybe not open access.

Cryptographic Key Generation and In Situ Encryption in One‐Transistor‐One‐Resistor Memristors for Hardware Security

Advanced Electronic Materials, 2021
The problem of hardware security is exacerbating in the artificial intelligence & Internet of Things era. Physical unclonable function (PUF) is a promising security primitive that exploits the intrinsic random variations in electronic hardware to produce
Ling Yang   +6 more
semanticscholar   +1 more source

Special Session: CAD for Hardware Security - Automation is Key to Adoption of Solutions

IEEE VLSI Test Symposium, 2021
Although hardware security has received significant attention in the past decade or so, security design and validation engineers and researchers in industry, academia, and government have not still been equipped with a mature security-aware toolset to ...
Sohrab Aftabjahani   +7 more
semanticscholar   +1 more source

Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned

ACM Great Lakes Symposium on VLSI, 2021
The recent trend of providing fast and flexible hardware platforms as-a-service coupled with the advancements in hardware design tools have significantly reduced the effort of designing new hardware.
A. Sadeghi   +2 more
semanticscholar   +1 more source

PUF Based Hardware Security: A Review

International Symposium on Devices, Circuits and Systems, 2021
In modern era, we are harnessing the power of electronic devices more than ever. It has become a part of our daily lives. Thus, the protection of the private data and hence the underlying hardware is becoming mandatory.
Koustav Dey, Malay Kule, H. Rahaman
semanticscholar   +1 more source

Hardware security in VLSI

Proceedings of the 21st edition of the great lakes symposium on Great lakes symposium on VLSI, 2011
This special session addresses the increasingly critical area of hardware security in VLSI. As computing becomes ubiquitous, most systems need to implement various layers of security, all of which rely on the security of the underlying hardware. At the same time, persistent trends in VLSI are producing challenges and opportunities in the design of ...
Yusuf Leblebici, Wayne Burleson
openaire   +2 more sources

Hardware enhanced security

Proceedings of the 2012 ACM conference on Computer and communications security, 2012
Building a secure computing system requires careful coordination among all layers in the system from hardware to software. Even if secure by itself, a higher layer protection mechanism may be bypassed if lower layer software or hardware is vulnerable. Additionally, hardware complements software through its efficiency, tamper resistance, etc. There have
Ruby B. Lee   +2 more
openaire   +2 more sources

Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database

IEEE International Symposium on Hardware Oriented Security and Trust
The scarcity of comprehensive databases and bench-marks in hardware design specifically tailored for security tasks is a significant challenge in the community.
Dipayan Saha   +4 more
semanticscholar   +1 more source

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module

IEEE transactions on computers, 2020
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic ...
Mohamad Ali Mehrabi   +2 more
semanticscholar   +1 more source

Software and Hardware Security of IoT

2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021
With the tremendous growth of IoT application, providing security to IoT systems has become more critical. In this paper, a technique is presented to ensure the safety of Internet of Things (IoT) devices.
A. Singh, Nagendra Kushwaha
semanticscholar   +1 more source

HARDWARE SECURITY

1979
Publisher Summary This chapter discusses hardware security. The chief components of computer hardware are primary memory, central processing units (CPUs), peripheral devices, and secondary memory. Hardware security is concerned with the incorporation of protection mechanisms into the primary memory, in the CPUs, in the peripheral devices, and in the ...
DAVID K. HSIAO   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy