Results 51 to 60 of about 526,457 (288)

Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The increasing prevalence of security breaches highlights the importanceof robust hardware security measures. Among these breaches, physical attacks– such as Side-Channel Analysis ( SCA) and Fault Injection (FI ) attacks – posea significant challenge ...
Sergej Meschkov   +3 more
doaj   +1 more source

THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]

open access: yes, 2012
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core  

Smart Face Masks as Wearable Respiratory Sensors: A Review of Sensor Technologies, Materials, and Future Directions

open access: yesAdvanced Healthcare Materials, EarlyView.
This review highlights recent advances in smart face masks that actively monitor breathing. By integrating humidity, gas, temperature, pressure, strain, and triboelectric sensors, these masks track key respiratory parameters in real time. The article summarizes sensor mechanisms, compares performance across studies, and discusses challenges and future ...
Negin Faramarzi   +7 more
wiley   +1 more source

An Advanced Detection Framework for Embedded System Vulnerabilities

open access: yesIEEE Access
Embedded systems serve as the foundation for modern computing in industrial, IoT, and defense applications. However, their increased adoption exposes them to security threats across multiple levels, from application software to operating systems and ...
Mansour Alqarni, Akramul Azim
doaj   +1 more source

Ferroelectric Quantum Dots for Retinomorphic In‐Sensor Computing

open access: yesAdvanced Materials, EarlyView.
This work has provided a protocol for fabricating retinomorphic phototransistors by integrating ferroelectric ligands with quantum dots. The resulting device combines ferroelectricity, optical responsiveness, and low‐power operation to enable adaptive signal amplification and high recognition accuracy under low‐light conditions, while supporting ...
Tingyu Long   +26 more
wiley   +1 more source

Hardware Validation for Semi-Coherent Transmission Security

open access: yesInformation
The rapid growth of Internet-connected devices integrating into our everyday lives has no end in sight. As more devices and sensor networks are manufactured, security tends to be a low priority.
Michael Fletcher   +2 more
doaj   +1 more source

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

open access: yes, 2019
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann   +3 more
core   +1 more source

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Tough, Ductile, and Strong Hard‐Soft Cementitious Composite Enabled by Multi‐Material Additive Manufacturing

open access: yesAdvanced Materials, EarlyView.
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine   +5 more
wiley   +1 more source

A Unified, Threat-Validated Taxonomy for Hardware Security Assurance

open access: yesJournal of Cybersecurity and Privacy
Hardware systems are foundational to critical infrastructure, embedded devices, and consumer products, making robust security assurance essential. However, existing hardware security standards remain fragmented, inconsistent in scope, and difficult to ...
Shao-Fang Wen, Arvind Sharma
doaj   +1 more source

Home - About - Disclaimer - Privacy