Results 21 to 30 of about 139,929 (306)
Risk in power trading is unavoidable for various reasons. The impact of this risk would vary based on the trading characteristics that mainly depend on the market design and power purchase agreements. So, a security risk management and control system for
Shuqin Kong +5 more
doaj +1 more source
Research on Design and Application of Online English Education Platform Based on Web
Aiming at the problems of low user satisfaction and long response time in traditional online English education platforms, this paper designs a web-based online English education platform and carries out relevant application tests. With the support of the
Yijuan Huang
doaj +1 more source
Deduction with XOR Constraints in Security API Modelling [PDF]
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach +13 more
core +2 more sources
Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems
The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-
Yong Xie +4 more
doaj +1 more source
Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire +1 more source
Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs [PDF]
Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) depends significantly on the underlying hardware.
Drutarovsky, Milos +3 more
core +1 more source
A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim +7 more
doaj +1 more source
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L. +10 more
core +4 more sources
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalists in the National Institute of Standards and Technology Post-Quantum Cryptography Standardization Process.
Cankun Zhao +9 more
doaj +1 more source
A modular software architecture for UAVs [PDF]
There have been several attempts to create scalable and hardware independent software architectures for Unmanned Aerial Vehicles (UAV). In this work, we propose an onboard architecture for UAVs where hardware abstraction, data storage and communication ...
Guney, Mehmet Ali +9 more
core +1 more source

