Results 11 to 20 of about 139,929 (306)

Hardware Security Module (HSM) [PDF]

open access: bronzeDatenschutz und Datensicherheit - DuD, 2009
Dirk Fox
openalex   +2 more sources

High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security [PDF]

open access: green
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks, especially in ...
Joshua Tito Amael   +2 more
openalex   +3 more sources

Hardware Security Module Cryptosystem Using Petri Net

open access: diamondIndonesian Journal of Electrical Engineering and Informatics (IJEEI), 2023
Billel Guechi, Mohammed Redjimi
openalex   +3 more sources

The Study on Hardware Security and Its Defense Measures [PDF]

open access: yesSHS Web of Conferences, 2022
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj   +1 more source

Research and Implementation of an Embedded Hardware-Assisted Debugging Mechanism [PDF]

open access: yesJisuanji gongcheng, 2022
A series of independent instruction architecture chips(called GCXP in this paper) mainly use the hardware debugging mechanism based on scan chain reuse.Compared to mainstream commercial embedded chip products, the hardware modulation mechanism of ...
LIU Peng, LIU Jie, JIA Xun
doaj   +1 more source

Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices

open access: yesInformation, 2023
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids.
Giriraj Sharma   +2 more
doaj   +1 more source

Multi-granularity Traffic Detection System of Group Based Policy for SDN [PDF]

open access: yesJisuanji gongcheng, 2017
In order to improve the network control ability and security,researchers usually utilize the features of centralized control and flow table control of Software Defined Network(SDN) to develop a lot of security applications.However,those security ...
DU Ruiying,HU Li,CHEN Jing,CHEN Jiong
doaj   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj   +3 more sources

Over-the-air software updates in the internet of things : an overview of key principles [PDF]

open access: yes, 2020
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan   +4 more
core   +1 more source

Research and application of 5G lightweight hardware encryption module for power terminals

open access: yesDianxin kexue, 2023
With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry ...
Chen ZHANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy