Results 261 to 270 of about 139,929 (306)

Enhancing IoT Security Through Hardware Security Modules (HSMs)

open access: closed2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS)
Mansoor Khan   +2 more
openalex   +2 more sources

Hardware Security Modules for Secure Communications in the Industrial Internet of Things

IEEE Communications Surveys & Tutorials
Shahid Latif   +5 more
openaire   +3 more sources

Hardware Security Modules

2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire   +1 more source

Securing the Smart Grid with Hardware Security Modules

2012
Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire   +1 more source

Privacy Enhancements for Hardware-Based Security Modules

2011
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan   +2 more
openaire   +2 more sources

Audit and backup procedures for hardware security modules

Proceedings of the 7th symposium on Identity and trust on the Internet, 2008
Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Túlio Cicero Salvaro de Souza   +2 more
openaire   +1 more source

Automotive Security Solution Using Hardware Security Module (HSM)

SAE Technical Paper Series
<div class="section abstract"><div class="htmlview paragraph">In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-
Arvind Kumar   +2 more
openaire   +1 more source

A study of Secure cryptographic based Hardware security module in a cloud environment

2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020
With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen.
J. Divya, S. Shivagami
openaire   +1 more source

Home - About - Disclaimer - Privacy