Results 71 to 80 of about 521,610 (289)

An Innovative Honeypot Architecture for Detecting and Mitigating Hardware Trojans in IoT Devices

open access: yesIoT
The exponential growth and widespread adoption of Internet of Things (IoT) devices have introduced many vulnerabilities. Attackers frequently exploit these flaws, necessitating advanced technological approaches to protect against emerging cyber threats ...
Amira Hossam Eldin Omar   +3 more
doaj   +1 more source

On-Device Power Analysis Across Hardware Security Domains.

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the device.
Colin O’Flynn, Alex Dewar
doaj   +1 more source

Open-TEE - An Open Virtual Trusted Execution Environment

open access: yes, 2015
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N.   +3 more
core   +1 more source

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY

open access: yesIraqi Journal for Computers and Informatics, 2020
Wireless networks used widely in office, home, and public places so security is one of the significant issues to keep the transmitted information safe. The applied security standards have been developed in response to the demand of high security and the ...
Intisar Shadeed Al-Mejibli   +1 more
doaj   +1 more source

Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]

open access: yes, 2002
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core  

Characterization and Design Framework for Micro‐ and Nanoscale Printed Metal Interconnects in Hybrid Electronic Systems

open access: yesAdvanced Materials Technologies, EarlyView.
This work establishes a framework for high‐resolution printed interconnects by coupling e‐jet printing control, multilayer deposition, and sintering optimization. Ink properties and printing speed influence particle stacking, while different sintering atmospheres drive distinct microstructural evolution.
Kaifan Yue   +6 more
wiley   +1 more source

A Practical Recovery Mechanism for Blockchain Hardware Wallets

open access: yesIEEE Access
Blockchain hardware wallets, through their security-by-design architecture, offer higher security assurances. They fundamentally differ from software wallets due to an important security property called Unicity.
Varun Deshpande   +2 more
doaj   +1 more source

Chemically Doped Conductive Polymers for Wearable Health Monitoring

open access: yesAdvanced Materials Technologies, EarlyView.
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo   +5 more
wiley   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj   +3 more sources

Home - About - Disclaimer - Privacy