Results 31 to 40 of about 8,466 (185)

Virtualization of the Encryption Card for Trust Access in Cloud Computing

open access: yesIEEE Access, 2017
The increasing use of virtualization puts stringent security requirements on software integrity and workload isolation of cloud computing. The encryption card provides hardware cryptographic services for users and is believed to be superior to software ...
Deliang Xu   +5 more
doaj   +1 more source

SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Cluster-based wireless sensor networks have advantages of scalability and efficient communication. However, a major security risk to cluster heads is a malicious code injection attack through which an adversary can completely control a cluster network to
Po-Hung Yang, Sung-Ming Yen
doaj   +1 more source

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption

open access: yesSensors, 2023
The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary ...
Phap Ngoc Duong, Hanho Lee
doaj   +1 more source

Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations

open access: yesEnergies, 2023
Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations.
Antonio J. Cabrera-Gutiérrez   +5 more
doaj   +1 more source

Building a Secure Scheme for a Trusted Hardware Sharing Environment

open access: yesIEEE Access, 2017
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu   +5 more
doaj   +1 more source

SofTEE: Software-Based Trusted Execution Environment for User Applications

open access: yesIEEE Access, 2020
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj   +1 more source

A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems

open access: yesApplied Sciences, 2022
As technology evolves, embedded systems access more networks and devices, which means more security threats. Existing security-monitoring methods with a single parameter (data or control flow) are not effective in detecting attackers tampering with the ...
Qiang Hao   +7 more
doaj   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

FPGA-Based Hardware Encryption of Power Line Patrol Drones

open access: yesZhongguo dianli, 2019
Communication of power line patrol UAV is currently protected with frequency hopping. However, malicious adversaries can steal sequence of frequency hopping and control the patrol UAV. In view of the security protection needs of patrol UAV in the process
Hao LUO   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy