Results 1 to 10 of about 139,929 (306)

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks [PDF]

open access: goldIEEE Access, 2022
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez   +5 more
doaj   +4 more sources

Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration [PDF]

open access: goldIEEE Access
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to ...
Md Sami Ul Islam Sami   +9 more
doaj   +4 more sources

Hardware Security Module [PDF]

open access: gold, 2023
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
Maria Sommerhalder
openalex   +2 more sources

A Formally Verified Configuration for Hardware Security Modules in the Cloud [PDF]

open access: greenProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every ...
Riccardo Focardi, Flaminia L. Luccio
openalex   +4 more sources

A Unified Memory and Hardware Security Module Based on the Adjustable Switching Window of Resistive Memory [PDF]

open access: goldIEEE Journal of the Electron Devices Society, 2020
Physically unclonable function (PUF) and true random number generator (TRNG) are critical primitives to provide lightweight hardware protection. As area is tightly restricted in IoT applications, merging PUF and TRNG is a novel trend to achieve higher ...
Bohan Lin   +5 more
doaj   +2 more sources

Hardware-based Security for Virtual Trusted Platform Modules [PDF]

open access: green, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in virtualized environments.
Sami Alsouri   +3 more
openalex   +3 more sources

Design of programmable hardware security modules for enhancing blockchain based security framework

open access: diamondInternational Journal of Electrical and Computer Engineering (IJECE), 2023
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP ...
Devika Kalathil Nandalal   +1 more
openalex   +3 more sources

Electronic Voting Using Identity Domain Separation and Hardware Security Modules [PDF]

open access: bronzeInternational Journal of E-Adoption, 2009
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed.
Thomas Rößler
openalex   +2 more sources

The K2 Architecture for Trustworthy Hardware Security Modules [PDF]

open access: goldProceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, 2023
Anish Athalye   +3 more
openalex   +3 more sources

Ceremonies Design for PKI's Hardware Security Modules

open access: goldAnais do IX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2009), 2009
Ceremonies are a useful tool to HSMs in PKI environments. They state operational procedures and usage scenarios. Their correct construction can lead to a safer operation. This paper presents basic ceremony procedures to manage the life cycle of cryptographic keys and ideas of requirements needed to assure security throughout the usage of ceremonies in ...
Jean Everson Martina   +2 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy