Results 11 to 20 of about 139,929 (306)
Hardware Security Module (HSM) [PDF]
Dirk Fox
openalex +2 more sources
High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security [PDF]
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks, especially in ...
Joshua Tito Amael +2 more
openalex +3 more sources
Hardware Security Module Cryptosystem Using Petri Net
Billel Guechi, Mohammed Redjimi
openalex +3 more sources
The Study on Hardware Security and Its Defense Measures [PDF]
With the globalization of the IC design supply chain and the universal interconnection of computers, the problem of hardware security has become increasingly prominent.
He Yang
doaj +1 more source
Research and Implementation of an Embedded Hardware-Assisted Debugging Mechanism [PDF]
A series of independent instruction architecture chips(called GCXP in this paper) mainly use the hardware debugging mechanism based on scan chain reuse.Compared to mainstream commercial embedded chip products, the hardware modulation mechanism of ...
LIU Peng, LIU Jie, JIA Xun
doaj +1 more source
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids.
Giriraj Sharma +2 more
doaj +1 more source
Multi-granularity Traffic Detection System of Group Based Policy for SDN [PDF]
In order to improve the network control ability and security,researchers usually utilize the features of centralized control and flow table control of Software Defined Network(SDN) to develop a lot of security applications.However,those security ...
DU Ruiying,HU Li,CHEN Jing,CHEN Jiong
doaj +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Over-the-air software updates in the internet of things : an overview of key principles [PDF]
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan +4 more
core +1 more source
Research and application of 5G lightweight hardware encryption module for power terminals
With the accelerated deployment of 5G new infrastructure, terminal application business has been gradually extended to various vertical industries.Although 5G technology can also adapt to the differentiated communication requirement for power industry ...
Chen ZHANG +4 more
doaj +2 more sources

