Results 281 to 290 of about 139,929 (306)
Some of the next articles are maybe not open access.
An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021Wei Hu +2 more
exaly
Development of Course Modules in Python for Hardware Security Education
Brooks Olney +2 more
openalex +1 more source
Suitability of Hardware Security Modules for Securing Remote Access in High-Performance Environments
A Virtual Private Network (VPN) enables encrypted access to private networks.In environments with particularly high security requirements, it may be necessary to protect the secret keys required for VPN operation from physical access to an exceptional degree.By storing the secret keys in a Hardware Security Module (HSM), these keys can be protected ...openaire +1 more source
OpenVPN TLS-Crypt-V2 Key Wrapping with Hardware Security Modules
The control channel protection of OpenVPN using the tls-crypt-v2 mechanism provides, among other, post-quantum security of the VPN tunnel. With tls-crypt-v2, a user sends a wrapped, pre-shared client key to the server when establishing a tunnel. If the server wrapping key is compromised, all client keys need to be renewed.openaire +1 more source
A survey of security issues in hardware virtualization
ACM Computing Surveys, 2013Levente Buttyan
exaly
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition
IEEE Transactions on Information Forensics and Security, 2012Eric Love, Yier Jin, Yiorgos Makris
exaly

