Results 1 to 10 of about 263,653 (212)
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami +9 more
doaj +2 more sources
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin +5 more
doaj +2 more sources
As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the ...
Qiang Hao +7 more
doaj +2 more sources
Hardware Security Module (HSM) [PDF]
Dirk Fox
openaire +2 more sources
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami +3 more
core +2 more sources
Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field [PDF]
The performance of any elliptic curve cryptography hardware accelerator significantly relies on the efficiency of the underlying point multiplication (PM) architecture.
Md Rownak Hossain +7 more
doaj +2 more sources
The Study on Hardware Security and Its Defense Measures [PDF]
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj +1 more source
Research and Implementation of an Embedded Hardware-Assisted Debugging Mechanism [PDF]
A series of independent instruction architecture chips(called GCXP in this paper) mainly use the hardware debugging mechanism based on scan chain reuse.Compared to mainstream commercial embedded chip products, the hardware modulation mechanism of ...
LIU Peng, LIU Jie, JIA Xun
doaj +1 more source
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids.
Giriraj Sharma +2 more
doaj +1 more source
Multi-granularity Traffic Detection System of Group Based Policy for SDN [PDF]
In order to improve the network control ability and security,researchers usually utilize the features of centralized control and flow table control of Software Defined Network(SDN) to develop a lot of security applications.However,those security ...
DU Ruiying,HU Li,CHEN Jing,CHEN Jiong
doaj +1 more source

