Results 21 to 30 of about 263,653 (212)

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks

open access: yesIEEE Access, 2022
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez   +5 more
doaj   +1 more source

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]

open access: yes, 2008
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L.   +10 more
core   +4 more sources

A Formally Verified Configuration for Hardware Security Modules in the Cloud [PDF]

open access: yesProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every ...
Riccardo Focardi, Flaminia Luccio
openaire   +2 more sources

A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalists in the National Institute of Standards and Technology Post-Quantum Cryptography Standardization Process.
Cankun Zhao   +9 more
doaj   +1 more source

Hardware-Assisted System for Program Execution Security of SOC

open access: yesITM Web of Conferences, 2016
With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus.
Wang Xiang   +7 more
doaj   +1 more source

A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses

open access: yesIEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021
It has been demonstrated that Software exploitable Hardware Trojan Horses (HTHs) can be inserted in commercial CPUs and memories. Such attacks allow malicious users to run their own software or to gain unauthorized privileges over the system.
A. Palumbo   +4 more
semanticscholar   +1 more source

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

open access: yesCryptography, 2023
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as
Geraldine Shirley Nicholas   +3 more
doaj   +1 more source

A modular software architecture for UAVs [PDF]

open access: yes, 2013
There have been several attempts to create scalable and hardware independent software architectures for Unmanned Aerial Vehicles (UAV). In this work, we propose an onboard architecture for UAVs where hardware abstraction, data storage and communication ...
Guney, Mehmet Ali   +9 more
core   +1 more source

Firmware Security Module

open access: yesJournal of Hardware and Systems Security, 2021
New services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile.
Claudius Pott   +4 more
semanticscholar   +1 more source

A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2016
How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs.
Tianshu Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy