Results 321 to 330 of about 2,442,732 (352)
Some of the next articles are maybe not open access.
Security design considerations of hardware
Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge - ACM 84, 1984Traditionally, computer hardware have been designed independent of the total system's approach. Central processing units can usually provide protection under software and firmware control, but do not provide for software copy protection and data integrity automatically. Storage devices and peripherals have been built to receive and transmit information
openaire +2 more sources
2014 IEEE Hot Chips 26 Symposium (HCS), 2014
Vikas Chandra, Robert Campbell Aitken
openaire +2 more sources
Vikas Chandra, Robert Campbell Aitken
openaire +2 more sources
A foundry's view of hardware security
2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), 2018A system is as secure as its weakest link. Current computing systems employ a multiple-layer approach to build a trusted environment. At the bottom of this multi-layer approach is a hardware root of trust which other layers build upon. It is important to assure this root of trust is secure and free from any weakness. Recently there is surge of research
openaire +2 more sources
A survey on hardware security of DNN models and accelerators
Journal of systems architecture, 2021Sparsh Mittal+2 more
semanticscholar +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly