Results 21 to 30 of about 522,468 (334)

Hardware-enabled security:

open access: yes, 2021
In today's cloud data centers and edge computing, attack surfaces have significantly increased, hacking has become industrialized, and most security control implementations are not coherent or consistent. The foundation of any data center or edge computing security strategy should be securing the platform on which data and workloads will be executed ...
Michael Bartock   +8 more
openaire   +2 more sources

Inertial measurement unit–aided dual-frequency radio frequency identification localization in line-of-sight and non-line-of-sight hybrid environment

open access: yesInternational Journal of Distributed Sensor Networks, 2018
The mitigation of non-line-of-sight propagation conditions is one of main challenges in wireless signal–based indoor localization. When radio frequency identification localization technology is applied in applications, the received signal strength ...
Jie Wu, Minghua Zhu, Bo Xiao, Wei He
doaj   +1 more source

Research on Defense Technology Against Hardware Trojans in Integrated Circuits [PDF]

open access: yesJisuanji gongcheng, 2016
With the further improvement of design,manufacture and test separation in Integrated Circuits(IC),hardware trojans can be implemented as modifications to IC,and it raises numerous concerns regarding possible threats.This paper briefly explains the ...
ZHAO Yiqiang,HE Jiaji,YANG Song,LIU Shenfeng
doaj   +1 more source

Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF

open access: yesIEEE Access, 2021
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan   +4 more
doaj   +1 more source

Deduction with XOR Constraints in Security API Modelling [PDF]

open access: yes, 2005
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach   +13 more
core   +2 more sources

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +1 more source

Secure pseudo-random linear binary sequences generators based on arithmetic polynoms

open access: yes, 2014
We present a new approach to constructing of pseudo-random binary sequences (PRS) generators for the purpose of cryptographic data protection, secured from the perpetrator's attacks, caused by generation of masses of hardware errors and faults.
A Omondi   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy