Results 21 to 30 of about 263,653 (212)
Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez +5 more
doaj +1 more source
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L. +10 more
core +4 more sources
A Formally Verified Configuration for Hardware Security Modules in the Cloud [PDF]
Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every ...
Riccardo Focardi, Flaminia Luccio
openaire +2 more sources
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalists in the National Institute of Standards and Technology Post-Quantum Cryptography Standardization Process.
Cankun Zhao +9 more
doaj +1 more source
Hardware-Assisted System for Program Execution Security of SOC
With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus.
Wang Xiang +7 more
doaj +1 more source
A Lightweight Security Checking Module to Protect Microprocessors against Hardware Trojan Horses
It has been demonstrated that Software exploitable Hardware Trojan Horses (HTHs) can be inserted in commercial CPUs and memories. Such attacks allow malicious users to run their own software or to gain unauthorized privileges over the system.
A. Palumbo +4 more
semanticscholar +1 more source
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, such as
Geraldine Shirley Nicholas +3 more
doaj +1 more source
A modular software architecture for UAVs [PDF]
There have been several attempts to create scalable and hardware independent software architectures for Unmanned Aerial Vehicles (UAV). In this work, we propose an onboard architecture for UAVs where hardware abstraction, data storage and communication ...
Guney, Mehmet Ali +9 more
core +1 more source
New services such as autonomous driving, the connectivity of the traffic infrastructure and the tight coupling of user operated smart devices with the vehicle have significantly increased the demand for cryptographic protection in the automobile.
Claudius Pott +4 more
semanticscholar +1 more source
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks
How to improve both security and energy efficiency is one of the most prominent issues in wireless sensor networks (WSNs). In this paper, we present a trusted and energy efficient approach for cluster-based WSNs.
Tianshu Wang +3 more
doaj +1 more source

