Results 61 to 70 of about 2,442,732 (352)

Designing secure systems on reconfigurable hardware

open access: yesACM Transactions on Design Automation of Electronic Systems, 2008
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integrate many functions onto a single device. Since embedded designers often have no choice but to use soft IP cores obtained from third parties, the cores operate at different ...
Huffmire, Ted   +6 more
openaire   +4 more sources

Magnetic‐Driven Torque‐Induced Electrical Stimulation for Millisecond‐Scale Wireless Neuromodulation

open access: yesAdvanced Healthcare Materials, EarlyView.
MagTIES is a wireless neuromodulation technique with millisecond precision. It employs magnetic‐driven torque from magnetite nanodiscs to activate piezoelectric nanoparticles, enabling precise temporal control of neuronal activity and brain oscillations using weak, low‐frequency magnetic fields.
Chao‐Chun Cheng   +5 more
wiley   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj   +3 more sources

Thermal Processing Creates Water‐Stable PEDOT:PSS Films for Bioelectronics

open access: yesAdvanced Materials, Volume 37, Issue 13, April 2, 2025.
Instead of using chemical cross–linkers, it is shown that PEDOT:PSS thin films for bioelectronics become water‐stable after a simple heat treatment. The heat treatment is compatible with a range of rigid and elastomeric substrates and films are stable in vivo for >20 days.
Siddharth Doshi   +16 more
wiley   +1 more source

ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY

open access: yesIraqi Journal for Computers and Informatics, 2020
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli   +1 more
doaj   +1 more source

Hardware Security in Case of Scan Based Attack on Crypto Hardware

open access: yesInternational Journal of VLSI Design & Communication Systems, 2018
The latest innovation technology in computing devices has given a rise of compact, speedy and economical products which also embeds cryptography hardware on-chip. This device generally holds secret key and confidential information, more attention has been given to attacks on hardware which guards such secure information.
Jayesh Popat, Usha Mehta
openaire   +3 more sources

Advances in Photonic Materials and Integrated Devices for Smart and Digital Healthcare: Bridging the Gap Between Materials and Systems

open access: yesAdvanced Materials, EarlyView.
This article summarizes significant technological advancements in materials, photonic devices, and bio‐interfaced systems, which demonstrate successful applications for impacting human healthcare via improved therapies, advanced diagnostics, and on‐skin health monitoring.
Seunghyeb Ban   +5 more
wiley   +1 more source

On-Device Power Analysis Across Hardware Security Domains.

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj   +1 more source

Challenges and Opportunities of Upconversion Nanoparticles for Emerging NIR Optoelectronic Devices

open access: yesAdvanced Materials, EarlyView.
The special photo‐responsiveness of upconversion nanoparticles has opened up a new path for the advancement of near‐infrared (NIR)‐responsive optoelectronics. However, challenges such as low energy‐conversion efficiency and high nonradiative losses still persist.
Sunyingyue Geng   +7 more
wiley   +1 more source

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

open access: yesIoT
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy