Results 11 to 20 of about 263,653 (212)

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj   +3 more sources

Research and application of 5G lightweight hardware encryption module for power terminals

open access: yesDianxin kexue, 2023
With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry ...
Chen ZHANG   +4 more
doaj   +2 more sources

Performance Verification of Bayesian Network–Based Security Risk Management and Control System for Power Trading Institutions

open access: yesFrontiers in Energy Research, 2022
Risk in power trading is unavoidable for various reasons. The impact of this risk would vary based on the trading characteristics that mainly depend on the market design and power purchase agreements. So, a security risk management and control system for
Shuqin Kong   +5 more
doaj   +1 more source

Over-the-air software updates in the internet of things : an overview of key principles [PDF]

open access: yes, 2020
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan   +4 more
core   +1 more source

Research on Design and Application of Online English Education Platform Based on Web

open access: yesInternational Journal of Antennas and Propagation, 2021
Aiming at the problems of low user satisfaction and long response time in traditional online English education platforms, this paper designs a web-based online English education platform and carries out relevant application tests. With the support of the
Yijuan Huang
doaj   +1 more source

Deduction with XOR Constraints in Security API Modelling [PDF]

open access: yes, 2005
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach   +13 more
core   +2 more sources

Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems

open access: yesSensors, 2021
The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-
Yong Xie   +4 more
doaj   +1 more source

A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

open access: yesSensors, 2021
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim   +7 more
doaj   +1 more source

Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]

open access: yes, 2010
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire   +1 more source

Towards a new framework for TPM compliance testing [PDF]

open access: yes, 2014
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy