Results 31 to 40 of about 263,653 (212)

A Software-Defined Security Approach for Securing Field Zones in Industrial Control Systems

open access: yesIEEE Access, 2019
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection.
Jun Yang   +3 more
doaj   +1 more source

Hardware Security Module

open access: yes, 2023
AbstractHardware security modules are specialized devices that perform cryptographic operations. Their functions include key generation, key management, encryption, decryption, and hashing. The advent of cloud computing has increased the complexity of securing critical data.
openaire   +1 more source

SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to
Po-Hung Yang, Sung-Ming Yen
doaj   +1 more source

Virtualization of the Encryption Card for Trust Access in Cloud Computing

open access: yesIEEE Access, 2017
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu   +5 more
doaj   +1 more source

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption

open access: yesSensors, 2023
The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary ...
Phap Ngoc Duong, Hanho Lee
doaj   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Design of programmable hardware security modules for enhancing blockchain based security framework

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP ...
Devika Kalathil Nandalal   +1 more
openaire   +1 more source

Building a Secure Scheme for a Trusted Hardware Sharing Environment

open access: yesIEEE Access, 2017
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy