Results 151 to 160 of about 263,653 (212)
Some of the next articles are maybe not open access.

Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module

IEEE transactions on computers, 2020
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic ...
Mohamad Ali Mehrabi   +2 more
semanticscholar   +1 more source

A Fast AES Hardware Security Module for Internet of Things Applications

International Journal on Advanced Science, Engineering and Information Technology, 2020
As the Internet of Things is used in various fields, Internet of Things security has become important. Since most Internet of Things devices is implemented as embedded systems, they provide a software-implemented encryption algorithm.
Minyoung Lee   +3 more
semanticscholar   +1 more source

Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module

IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Due to the rapid growth of using Internet of Things (IoT) devices in the daily life, the need to achieve an acceptable level of security and privacy according to the real security risks for these devices is rising.
Ahmed Ayoub, M. Aagaard
semanticscholar   +1 more source

Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications

International Symposium on Circuits and Systems, 2019
Data security is the main challenge in Internet of Things (IoT) applications. Security strength and the immunity to security attacks depend mainly on the available power budget.
Nagham Samir   +6 more
semanticscholar   +1 more source

Hands-On Teaching of Hardware Security for Machine Learning

ACM Great Lakes Symposium on VLSI, 2022
Hardware security for machine learning (ML) and artificial intelligence (AI) circuits is becoming a major topic within the cybersecurity framework. Although much research is ongoing on this front, the community omits the educational components.
Ashley Calhoun   +4 more
semanticscholar   +1 more source

Adding Hardware Security into IoT-Blockchain Platforms

IEEE Latin-American Conference on Communications, 2022
Blockchain is a technology that could help secure Internet of Things (IoT) systems and allow for easy interactions and communications among IoT devices without compromising their security.
Subhi M. Alrubei, E. Ball, J. Rigelsford
semanticscholar   +1 more source

Ceremonies Design for PKI's Hardware Security Modules

Anais do IX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2009), 2009
Ceremonies are a useful tool to HSMs in PKI environments. They state operational procedures and usage scenarios. Their correct construction can lead to a safer operation. This paper presents basic ceremony procedures to manage the life cycle of cryptographic keys and ideas of requirements needed to assure security throughout the usage of ceremonies in ...
Jean Everson Martina   +2 more
openaire   +1 more source

Development and Research of a Hardware Security Module to Control and Protect Access to Industrial Equipment

2024 International Seminar on Electron Devices Design and Production (SED)
The development of a test version of the Hardware Security Module (HSM), presented in this article, solves the tasks of cyber protection of individual uncontrolled sections of the field-level communication network (RS-485, RS422) that are physically ...
V. Kokovin   +4 more
semanticscholar   +1 more source

Hardware Security Modules

2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire   +1 more source

Mutual Authentication Protocol using ECC and Hardware Security Module for IoT Devices

International Conference on Smart Communications and Networking
In response to the increased deployment of IoT devices in homes and offices during and after the COVID-19 pandemic-a time when such devices are susceptible to physical and cyber threats-this study explores a mutual authentication protocol leveraging ...
Suk-Jin Lee   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy