Results 311 to 320 of about 2,442,732 (352)
Computer Vision for Hardware Security [PDF]
The application of computer vision to hardware security has the potential to address the limitations of both electrical testing and traditional physical inspection approaches to hardware security. This chapter begins by providing an overview of basic computer vision concepts as well as a description of pipeline tasks.
Daniel E. Capecci+4 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Embedded Systems Letters
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti+1 more
openaire +2 more sources
In this letter, a combined encryption and error-control coding scheme based on Turbo Codes (TC) is proposed to enhance the security of the transmission. It relies on Convolutional Encoders that operate over Galois Fields GF(4) and include variable encryption polynomials, whose coefficients are randomly selected every L steps from a set of optimal ...
Raúl Eduardo Lopresti+1 more
openaire +2 more sources
Improving Hardware Security for LoRaWAN
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. LoRaWAN is one of the most outstanding technologies for massive IoT communications due to features such as large coverage and low power consumption. In this
Natalia Chinchilla-Romero+3 more
openaire +2 more sources
Trends in Hardware Security: From basics to ASICs
IEEE Solid-State Circuits Magazine, 2019This article presents an excerpt of the tutorial on hardware security delivered at the 2019 IEEE International Solid-State Circuits Conference [4] and an introduction to a performance scaling trend perspective for security primitives. The latter provides
M. Alioto
semanticscholar +1 more source
Hardware Security of CE Devices [Hardware Matters]
IEEE Consumer Electronics Magazine, 2017In my previous columns, I have covered various topics, including the evolution of the intellectual property core industry, digital integrated circuit (IC) design flow, high-level perspectives on intellectual property (IP) cores, and the transient fault resiliency of IP cores.
openaire +2 more sources
Machine Learning in Hardware Security
2020The ever-increasing demand for higher computing capabilities constantly pushes the development of the semiconductor industry and is making modern hardware an extremely complicated artifact. However, with the increased complexity of today’s hardware systems, their security is also challenged by various vulnerabilities coming from different perspectives.
Wenhao Wang+6 more
openaire +2 more sources
Secured Hardware Design - An Overview
2008 IEEE Region 5 Conference, 2008Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices.
Waleed K. Al-Assadi, S. Burugapalli
openaire +2 more sources
Hardware Encapsulation of Security Services
2003Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty.
Adrian Baldwin, Simon Shiu
openaire +2 more sources
New Directions in Hardware Security
2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), 2016Summary form only. Over the last decade, Hardware Security has developed to become one of the major research areas in Electronics and Computer Engineering and Computer Science. Hardware Security research deals with cutting-edge problems and their solutions in the domains of Detection and Prevention against Hardware Trojans, Counterfeit Electronics ...
openaire +2 more sources
Introduction to Hardware Security and Trust
2012This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems.
Mohammad Tehranipoor, Cliff Wang
openaire +2 more sources