Results 121 to 130 of about 8,466 (185)

Design, Implementation, and Evaluation of a Vehicular Hardware Security Module [PDF]

open access: closed, 2012
Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for ...
Marko Wolf, Timo Gendrullis
openaire   +2 more sources

Privacy Enhancements for Hardware-Based Security Modules [PDF]

open access: closed, 2011
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan   +2 more
openaire   +3 more sources

Notice of Retraction Analysis of hardware security for cryptographical module [PDF]

open access: closed2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE), 2013
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Deqing Xue, Jie Liu
openaire   +2 more sources

Audit and backup procedures for hardware security modules

open access: closedProceedings of the 7th symposium on Identity and trust on the Internet, 2008
Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Tulio Cicero Salvaro de Souza   +2 more
openaire   +3 more sources

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module

open access: closedIEEE Transactions on Computers, 2020
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic curve cryptography (ECC).
Mohamad Ali Mehrabi   +2 more
openaire   +5 more sources

Securing the Smart Grid with Hardware Security Modules

open access: closed, 2012
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Andreas Philipp, Dieter Bong
openaire   +3 more sources

Improving security in information technology using cryptographic hardware modules

open access: closedProceedings. 36th Annual 2002 International Carnahan Conference on Security Technology, 2003
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
Celia Lopez-Ongil   +3 more
openaire   +3 more sources

E-Voting: A Scalable Approach using XML and Hardware Security Modules

open access: closed2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2005
E-voting increasingly gains interest in e-democracy and e-government movements. Not only the security and the availability of electronic election systems are of paramount importance, but also the scalability is of major interest. Especially the fact that in political elections the system has to scale nation-wide, thus having several millions of users ...
Reinhard Posch   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy