Results 121 to 130 of about 8,466 (185)
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module [PDF]
Todays in-vehicle IT architectures are dominated by a large network of interactive, software driven digital microprocessors called electronic control units (ECU). However, ECUs relying on information received from open communication channels created by other ECUs or even other vehicles that are not under its control leaves the doors wide open for ...
Marko Wolf, Timo Gendrullis
openaire +2 more sources
Privacy Enhancements for Hardware-Based Security Modules [PDF]
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan+2 more
openaire +3 more sources
Notice of Retraction Analysis of hardware security for cryptographical module [PDF]
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Haitao Sun, Deqing Xue, Jie Liu
openaire +2 more sources
Audit and backup procedures for hardware security modules
Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Tulio Cicero Salvaro de Souza+2 more
openaire +3 more sources
Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic curve cryptography (ECC).
Mohamad Ali Mehrabi+2 more
openaire +5 more sources
Securing the Smart Grid with Hardware Security Modules
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Andreas Philipp, Dieter Bong
openaire +3 more sources
Improving security in information technology using cryptographic hardware modules
It is widely known that information technology applications should be secured. During the last years, special efforts have been applied to achieve a great level of security. These efforts have increased the security in some aspects, such as cryptographic algorithms, authentication techniques, etc.
Celia Lopez-Ongil+3 more
openaire +3 more sources
E-Voting: A Scalable Approach using XML and Hardware Security Modules
E-voting increasingly gains interest in e-democracy and e-government movements. Not only the security and the availability of electronic election systems are of paramount importance, but also the scalability is of major interest. Especially the fact that in political elections the system has to scale nation-wide, thus having several millions of users ...
Reinhard Posch+2 more
openaire +3 more sources