Results 161 to 170 of about 263,653 (212)
Some of the next articles are maybe not open access.
TPMWallet: Towards Blockchain Hardware Wallet using Trusted Platform Module in IoT
International Conference on Computing, Networking and Communications, 2023Ensuring the authenticity of the system communication and the well-preservation of the provided data is the basic and important foundation of a well-operated information system.
Wei-Yang Chiu, W. Meng, Wenjuan Li
semanticscholar +1 more source
Securing the Smart Grid with Hardware Security Modules
2012Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire +1 more source
Hardware-Supported Patching of Security Bugs in Hardware IP Blocks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023To satisfy various design requirements and application needs, designers integrate multiple intellectual property blocks (IPs) to produce a system on chip (SoC).
Wei-Kai Liu +4 more
semanticscholar +1 more source
An inexpensive plug-and-play hardware security module to restore systems from malware attacks
International Conference on Informatics, Electronics and Vision, 2013Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc ...
A. Asaduzzaman +2 more
semanticscholar +1 more source
Privacy Enhancements for Hardware-Based Security Modules
2011The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan +2 more
openaire +2 more sources
Drone security module for UAV data encryption
Information and Communication Technology Convergence, 2020As aviation technology gradually advances, the use of UAVs is gradually expanding in environments where are difficult for humans to perform directly and in dangerous environments.
Keonwoo Kim, Yousung Kang
semanticscholar +1 more source
IEEE transactions on nanotechnology, 2020
The generation of true random numbers is one of the most important tasks in a hardware security module (HSM), particularly for cryptography applications. The stochastic behavior of electronic devices can be used to generate random numbers. In this paper,
Abdolah Amirany +2 more
semanticscholar +1 more source
The generation of true random numbers is one of the most important tasks in a hardware security module (HSM), particularly for cryptography applications. The stochastic behavior of electronic devices can be used to generate random numbers. In this paper,
Abdolah Amirany +2 more
semanticscholar +1 more source
Audit and backup procedures for hardware security modules
Proceedings of the 7th symposium on Identity and trust on the Internet, 2008Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Túlio Cicero Salvaro de Souza +2 more
openaire +1 more source
2020 20th International Symposium on Computer Architecture and Digital Systems (CADS), 2020
In this paper, the security of existing DPR design flows are analyzed, and some practical vulnerabilities are introduced by an attack scenario in which the adversary exploits the remote DPR capability of the FPGA to launch Hardware Trojan Horse (HTH ...
Hanieh Jafarzadeh, A. Jahanian
semanticscholar +1 more source
In this paper, the security of existing DPR design flows are analyzed, and some practical vulnerabilities are introduced by an attack scenario in which the adversary exploits the remote DPR capability of the FPGA to launch Hardware Trojan Horse (HTH ...
Hanieh Jafarzadeh, A. Jahanian
semanticscholar +1 more source
Configurable secure ECC hardware module for resource constrained device
2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia), 2009in this paper, a novel ECC hardware module that provides different secure levels for resource constrained device is introduced. We adopt MOF left-to-right recoding scheme to achieve small area. Moreover, the design reduces the area cost of modular inversion by exploring reusability.
Qian Xu, Yujie Zhou, null Junfa Mao
openaire +1 more source

