Results 81 to 90 of about 521,610 (289)
Hardware Trojan Detection in Open-Source Hardware Designs Using Machine Learning
The globalization of the hardware supply chain reduces costs but increases security challenges with the potential insertion of hardware trojans by third parties.
Victor Takashi Hayashi +1 more
doaj +1 more source
Hardware Assisted Security Platform [PDF]
Embedded systems are often used to monitor and control various dynamic and complex applications. However, with greater accessibility and added features on many embedded systems, more and more systems are being subject to sophisticated and new types of attacks.
openaire +1 more source
Towards Security Requirements in Online Summative Assessments
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core
Passive Shape‐Adaptive Fluidic Interface for Enhanced Skin‐Sensor Coupling in Wearable Devices
This study presents a passive fluidic interface for wearable biosensors that adapts to static and dynamic body shape changes to maintain consistent skin contact. Flexible, fluid‐filled pouches redistribute pressure from high‐load areas to regions requiring improved contact, enhancing signal quality and comfort in a compact, low‐energy design for ...
Natalia Sanchez‐Tamayo +6 more
wiley +1 more source
A memristor fingerprinting and characterisation methodology for hardware security. [PDF]
Aitchison C +3 more
europepmc +1 more source
Recent Advances of Slip Sensors for Smart Robotics
This review summarizes recent progress in robotic slip sensors across mechanical, electrical, thermal, optical, magnetic, and acoustic mechanisms, offering a comprehensive reference for the selection of slip sensors in robotic applications. In addition, current challenges and emerging trends are identified to advance the development of robust, adaptive,
Xingyu Zhang +8 more
wiley +1 more source
A RRAM-Based True Random Number Generator with 2T1R Architecture for Hardware Security Applications. [PDF]
Peng B, Wu Q, Wang Z, Yang J.
europepmc +1 more source
Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi +12 more
wiley +1 more source
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
openaire +1 more source
Fabric‐Based Wearable Robotic Exoskeleton Gloves: Advancements and Challenges
This review highlights interdisciplinary technological advances in fabric‐based robotic gloves, focusing on progress in design, fabrication, actuation, sensing, control, and power and energy requirements. It also addresses performance testing and validation, including biomechanical, strength, functional, user experience, and durability assessments, to ...
Ayse Feyza Yilmaz +2 more
wiley +1 more source

