Results 161 to 170 of about 263,653 (212)
Some of the next articles are maybe not open access.

TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT

International Conference on Computing, Networking and Communications, 2023
Ensuring the authenticity of the system communication and the well-preservation of the provided data is the basic and important foundation of a well-operated information system.
Wei-Yang Chiu, W. Meng, Wenjuan Li
semanticscholar   +1 more source

Securing the Smart Grid with Hardware Security Modules

2012
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire   +1 more source

Hardware-Supported Patching of Security Bugs in Hardware IP Blocks

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
To satisfy various design requirements and application needs, designers integrate multiple intellectual property blocks (IPs) to produce a system on chip (SoC).
Wei-Kai Liu   +4 more
semanticscholar   +1 more source

An inexpensive plug-and-play hardware security module to restore systems from malware attacks

International Conference on Informatics, Electronics and Vision, 2013
Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc ...
A. Asaduzzaman   +2 more
semanticscholar   +1 more source

Privacy Enhancements for Hardware-Based Security Modules

2011
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan   +2 more
openaire   +2 more sources

Drone security module for UAV data encryption

Information and Communication Technology Convergence, 2020
As aviation technology gradually advances, the use of UAVs is gradually expanding in environments where are difficult for humans to perform directly and in dangerous environments.
Keonwoo Kim, Yousung Kang
semanticscholar   +1 more source

True Random Number Generator for Reliable Hardware Security Modules Based on a Neuromorphic Variation-Tolerant Spintronic Structure

IEEE transactions on nanotechnology, 2020
The generation of true random numbers is one of the most important tasks in a hardware security module (HSM), particularly for cryptography applications. The stochastic behavior of electronic devices can be used to generate random numbers. In this paper,
Abdolah Amirany   +2 more
semanticscholar   +1 more source

Audit and backup procedures for hardware security modules

Proceedings of the 7th symposium on Identity and trust on the Internet, 2008
Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Túlio Cicero Salvaro de Souza   +2 more
openaire   +1 more source

Real Vulnerabilities in Partial Reconfigurable Design Cycles; Case Study for Implementation of Hardware Security Modules

2020 20th International Symposium on Computer Architecture and Digital Systems (CADS), 2020
In this paper, the security of existing DPR design flows are analyzed, and some practical vulnerabilities are introduced by an attack scenario in which the adversary exploits the remote DPR capability of the FPGA to launch Hardware Trojan Horse (HTH ...
Hanieh Jafarzadeh, A. Jahanian
semanticscholar   +1 more source

Configurable secure ECC hardware module for resource constrained device

2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia), 2009
in this paper, a novel ECC hardware module that provides different secure levels for resource constrained device is introduced. We adopt MOF left-to-right recoding scheme to achieve small area. Moreover, the design reduces the area cost of modular inversion by exploring reusability.
Qian Xu, Yujie Zhou, null Junfa Mao
openaire   +1 more source

Home - About - Disclaimer - Privacy