Results 321 to 330 of about 2,442,732 (352)
Some of the next articles are maybe not open access.

Security design considerations of hardware

Proceedings of the 1984 annual conference of the ACM on The fifth generation challenge - ACM 84, 1984
Traditionally, computer hardware have been designed independent of the total system's approach. Central processing units can usually provide protection under software and firmware control, but do not provide for software copy protection and data integrity automatically. Storage devices and peripherals have been built to receive and transmit information
openaire   +2 more sources

Mobile hardware security

2014 IEEE Hot Chips 26 Symposium (HCS), 2014
Vikas Chandra, Robert Campbell Aitken
openaire   +2 more sources

A foundry's view of hardware security

2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), 2018
A system is as secure as its weakest link. Current computing systems employ a multiple-layer approach to build a trusted environment. At the bottom of this multi-layer approach is a hardware root of trust which other layers build upon. It is important to assure this root of trust is secure and free from any weakness. Recently there is surge of research
openaire   +2 more sources

A survey on hardware security of DNN models and accelerators

Journal of systems architecture, 2021
Sparsh Mittal   +2 more
semanticscholar   +1 more source

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

IEEE Communications Surveys and Tutorials, 2021
Bo-chao Cheng   +2 more
exaly  

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

IEEE Communications Surveys and Tutorials, 2020
Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly  

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

IEEE Communications Surveys and Tutorials, 2022
Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly  

Machine Learning in IoT Security: Current Solutions and Future Challenges

IEEE Communications Surveys and Tutorials, 2020
Ekram Hossain   +2 more
exaly  

A Survey on Metaverse: Fundamentals, Security, and Privacy

IEEE Communications Surveys and Tutorials, 2023
Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly  

Hardware Security


M. Tehranipoor   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy