Results 31 to 40 of about 263,653 (212)
A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection.
Jun Yang +3 more
doaj +1 more source
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
openaire +1 more source
SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks
Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to
Po-Hung Yang, Sung-Ming Yen
doaj +1 more source
Virtualization of the Encryption Card for Trust Access in Cloud Computing
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu +5 more
doaj +1 more source
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E. +4 more
core +1 more source
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan +3 more
doaj +1 more source
Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption
The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary ...
Phap Ngoc Duong, Hanho Lee
doaj +1 more source
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Design of programmable hardware security modules for enhancing blockchain based security framework
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP ...
Devika Kalathil Nandalal +1 more
openaire +1 more source
Building a Secure Scheme for a Trusted Hardware Sharing Environment
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu +5 more
doaj +1 more source

