Results 141 to 150 of about 8,466 (185)
Some of the next articles are maybe not open access.
Toward scaling hardware security module for emerging cloud services
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019The hardware security module (HSM) has been used as a root of trust for various key management services. At the same time, rapid innovation in emerging industries, such as container-based microservices, accelerates demands for scaling security services.
Juhyeng Han+3 more
openaire +2 more sources
Configurable secure ECC hardware module for resource constrained device
2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia), 2009in this paper, a novel ECC hardware module that provides different secure levels for resource constrained device is introduced. We adopt MOF left-to-right recoding scheme to achieve small area. Moreover, the design reduces the area cost of modular inversion by exploring reusability.
Qian Xu, Yujie Zhou, Junfa Mao
openaire +2 more sources
Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020Due to the rapid growth of using Internet of Things (IoT) devices in the daily life, the need to achieve an acceptable level of security and privacy according to the real security risks for these devices is rising. Security risks may include privacy threats like gaining sensitive information from a device, and authentication problems from counterfeit ...
Ahmed A. Ayoub, Mark D. Aagaard
openaire +2 more sources
Poor Man's Hardware Security Module (pmHSM)
Proceedings of the 9th Latin America Networking Conference, 2016The DNS Security Extensions (DNSSEC) add a new layer of security based on public-key infrastructure: each DNS record is digitally signed to verify the authenticity of the answer. However, the introduction of DNSSEC has an impact in the operational workflow of DNS systems: (i) signatures have an expiration date, hence the records must be periodically ...
Alejandro Hevia+5 more
openaire +2 more sources
Secure AES Hardware Module for Resource Constrained Devices
2005Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an
Elena Trichina, Tymur Korkishko
openaire +2 more sources
Enhancing IoT Security Through Hardware Security Modules (HSMs)
Mansoor Khan, Muhammad Ilyas, Oguz Bayat
openaire +2 more sources
A secure channel establishment method on a hardware security module
2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014Dae-won Kim+2 more
openaire +2 more sources
Development of Course Modules in Python for Hardware Security Education
Brooks Olney+2 more
openalex +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly