Results 31 to 40 of about 2,442,732 (352)

Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security

open access: yesIEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2021
The last decade has witnessed remarkable research advances at the intersection of machine learning (ML) and hardware security. The confluence of the two technologies has created many interesting and unique opportunities, but also left some issues in ...
Wenye Liu   +8 more
semanticscholar   +1 more source

Reliable, Secure, and Efficient Hardware Implementation of Password Manager System Using SRAM PUF

open access: yesIEEE Access, 2021
Using Physical Unclonable Functions (PUFs) within the server-side has been recently proposed to address security vulnerabilities of the password (PW) authentication mechanism, including attacks on the database (DB) of user credentials.
Mohammad Mohammadinodoushan   +4 more
doaj   +1 more source

Inertial measurement unit–aided dual-frequency radio frequency identification localization in line-of-sight and non-line-of-sight hybrid environment

open access: yesInternational Journal of Distributed Sensor Networks, 2018
The mitigation of non-line-of-sight propagation conditions is one of main challenges in wireless signal–based indoor localization. When radio frequency identification localization technology is applied in applications, the received signal strength ...
Jie Wu, Minghua Zhu, Bo Xiao, Wei He
doaj   +1 more source

Consolidating Security Notions in Hardware Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitches ...
Lauren De Meyer   +2 more
doaj   +1 more source

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +1 more source

Design and analysis of hardware Trojans in approximate circuits

open access: yesElectronics Letters, 2022
Approximate computing can accept errors in computation systems to achieve better utilisation of hardware resources. Approximate computing has been successfully developed in integrated circuits, such as approximate arithemtic circuits and approximate ...
Yuqin Dou   +4 more
doaj   +1 more source

Hardware Security in Sensor and its Networks

open access: yesFrontiers in Sensors, 2022
Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in ...
Mohammad Mezanur Rahman Monjur   +7 more
doaj   +1 more source

Towards Energy-Efficient and Secure Computing Systems

open access: yesJournal of Low Power Electronics and Applications, 2018
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems.
Zhiming Zhang, Qiaoyan Yu
doaj   +1 more source

Hardware Trojan Detection and Mitigation in NoC using Key authentication and Obfuscation Techniques

open access: yesEmitter: International Journal of Engineering Technology, 2022
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency.
Thejaswini P   +5 more
doaj   +1 more source

WaC: A New Doctrine for Hardware Security [PDF]

open access: yesASHES@CCS, 2020
In this paper, we promote the idea that recent woes in hardware security are not because of a lack of technical solutions but rather because market forces and incentives prevent those with the ability to fix problems from doing so.
A. Hastings, S. Sethumadhavan
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy