Results 21 to 30 of about 139,929 (306)

Performance Verification of Bayesian Network–Based Security Risk Management and Control System for Power Trading Institutions

open access: yesFrontiers in Energy Research, 2022
Risk in power trading is unavoidable for various reasons. The impact of this risk would vary based on the trading characteristics that mainly depend on the market design and power purchase agreements. So, a security risk management and control system for
Shuqin Kong   +5 more
doaj   +1 more source

Research on Design and Application of Online English Education Platform Based on Web

open access: yesInternational Journal of Antennas and Propagation, 2021
Aiming at the problems of low user satisfaction and long response time in traditional online English education platforms, this paper designs a web-based online English education platform and carries out relevant application tests. With the support of the
Yijuan Huang
doaj   +1 more source

Deduction with XOR Constraints in Security API Modelling [PDF]

open access: yes, 2005
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module.
C. Weidenbach   +13 more
core   +2 more sources

Security-Related Hardware Cost Optimization for CAN FD-Based Automotive Cyber-Physical Systems

open access: yesSensors, 2021
The introduction of various networks into automotive cyber-physical systems (ACPS) brings great challenges on security protection of ACPS functions, the auto industry recommends to adopt the hardware security module (HSM)-based multicore ECU to secure in-
Yong Xie   +4 more
doaj   +1 more source

Secure Upgrade of Hardware Security Modules in Bank Networks [PDF]

open access: yes, 2010
We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed at the ATMs, have been shown to suffer from API level attacks that allow an insider to recover user PINs
FOCARDI, Riccardo, LUCCIO, Flaminia
openaire   +1 more source

Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs [PDF]

open access: yes, 2016
Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) depends significantly on the underlying hardware.
Drutarovsky, Milos   +3 more
core   +1 more source

A Sensing Device with the Optical Temperature Sensors-Based Quad-RX Module and a Security Module

open access: yesSensors, 2021
In this paper, we present a sensing device with the optical temperature sensors-based quad receiver (Quad-RX) module and a security module. In addition, in order to prevent cyberattacks on critical national infrastructures and key facilities, we ...
Kyeeun Kim   +7 more
doaj   +1 more source

Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [PDF]

open access: yes, 2008
Vehicular Communication (VC) systems are on the verge of practical deployment. Nonetheless, their security and privacy protection is one of the problems that have been addressed only recently.
Buttyan, L.   +10 more
core   +4 more sources

A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalists in the National Institute of Standards and Technology Post-Quantum Cryptography Standardization Process.
Cankun Zhao   +9 more
doaj   +1 more source

A modular software architecture for UAVs [PDF]

open access: yes, 2013
There have been several attempts to create scalable and hardware independent software architectures for Unmanned Aerial Vehicles (UAV). In this work, we propose an onboard architecture for UAVs where hardware abstraction, data storage and communication ...
Guney, Mehmet Ali   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy