Results 1 to 10 of about 263,653 (212)

Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration

open access: yesIEEE Access
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami   +9 more
doaj   +2 more sources

A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory

open access: yesIEEE Journal of the Electron Devices Society, 2020
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin   +5 more
doaj   +2 more sources

A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems

open access: yesApplied Sciences, 2022
As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the ...
Qiang Hao   +7 more
doaj   +2 more sources

Hardware Security Module (HSM) [PDF]

open access: yesDatenschutz und Datensicherheit - DuD, 2009
Dirk Fox
openaire   +2 more sources

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core   +2 more sources

Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field [PDF]

open access: yesScientific Reports
The performance of any elliptic curve cryptography hardware accelerator significantly relies on the efficiency of the underlying point multiplication (PM) architecture.
Md Rownak Hossain   +7 more
doaj   +2 more sources

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

Research and Implementation of an Embedded Hardware-Assisted Debugging Mechanism [PDF]

open access: yesJisuanji gongcheng, 2022
A series of independent instruction architecture chips(called GCXP in this paper) mainly use the hardware debugging mechanism based on scan chain reuse.Compared to mainstream commercial embedded chip products, the hardware modulation mechanism of ...
LIU Peng, LIU Jie, JIA Xun
doaj   +1 more source

Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices

open access: yesInformation, 2023
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids.
Giriraj Sharma   +2 more
doaj   +1 more source

Multi-granularity Traffic Detection System of Group Based Policy for SDN [PDF]

open access: yesJisuanji gongcheng, 2017
In order to improve the network control ability and security,researchers usually utilize the features of centralized control and flow table control of Software Defined Network(SDN) to develop a lot of security applications.However,those security ...
DU Ruiying,HU Li,CHEN Jing,CHEN Jiong
doaj   +1 more source

Home - About - Disclaimer - Privacy