Results 261 to 270 of about 139,929 (306)
Enhancing IoT Security Through Hardware Security Modules (HSMs)
Mansoor Khan +2 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Hardware Security Modules for Secure Communications in the Industrial Internet of Things
IEEE Communications Surveys & TutorialsShahid Latif +5 more
openaire +3 more sources
2013
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
Hardware Security Modules/(HSMs), also known as Tamper Resistant Security Modules (TRSMs), are devices dedicated to performing cryptographic functions such as data encryption/decryption, certificate management and calculation of specific values such as card verification values (CVVs) or Personal Identification Numbers (PINs).
Stathis Mavrovouniotis, Mick Ganley
openaire +1 more source
Securing the Smart Grid with Hardware Security Modules
2012Security vendors have a major role to play in today’s smart grid ecosystem. Because the smart grid network includes intelligent endpoints and network devices that collect and relay information to a utility’s back office via an IP network, there are inherent security and risk concerns.
Dieter Bong, Andreas Philipp
openaire +1 more source
Privacy Enhancements for Hardware-Based Security Modules
2011The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world.
Pasupathinathan, Vijayakrishnan +2 more
openaire +2 more sources
Audit and backup procedures for hardware security modules
Proceedings of the 7th symposium on Identity and trust on the Internet, 2008Hardware Security Modules (HSMs) are an useful tool to deploy public key infrastructure (PKI) and its applications. This paper presents necessary procedures and protocols to perform backup and audit in such devices when deployed in PKIs. These protocols were evaluated in an implementation of a real HSM, enabling it to perform secure backups and to ...
Túlio Cicero Salvaro de Souza +2 more
openaire +1 more source
Automotive Security Solution Using Hardware Security Module (HSM)
SAE Technical Paper Series<div class="section abstract"><div class="htmlview paragraph">In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-
Arvind Kumar +2 more
openaire +1 more source
A study of Secure cryptographic based Hardware security module in a cloud environment
2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020With the expansion of distributed computing, security of sensitive client information is emerging as a significant challenge. This paper proposes a secured cloud engineering with an equipment security module that separates cloud client information from conceivably malignant special areas or cloud chairmen.
J. Divya, S. Shivagami
openaire +1 more source

