Results 11 to 20 of about 263,653 (212)
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Research and application of 5G lightweight hardware encryption module for power terminals
With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry ...
Chen ZHANG +4 more
doaj +2 more sources
Risk in power trading is unavoidable for various reasons. The impact of this risk would vary based on the trading characteristics that mainly depend on the market design and power purchase agreements. So, a security risk management and control system for
Shuqin Kong +5 more
doaj +1 more source
Over-the-air software updates in the internet of things : an overview of key principles [PDF]
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan +4 more
core +1 more source
Research on Design and Application of Online English Education Platform Based on Web
Aiming at the problems of low user satisfaction and long response time in traditional online English education platforms, this paper designs a web-based online English education platform and carries out relevant application tests. With the support of the
Yijuan Huang
doaj +1 more source
Deduction with XOR Constraints in Security API Modelling [PDF]
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach +13 more
core +2 more sources
Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems
The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-
Yong Xie +4 more
doaj +1 more source
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim +7 more
doaj +1 more source
Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire +1 more source
Towards a new framework for TPM compliance testing [PDF]
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail +2 more
core +2 more sources

