Results 41 to 50 of about 263,653 (212)

SofTEE: Software-Based Trusted Execution Environment for User Applications

open access: yesIEEE Access, 2020
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj   +1 more source

Blockchain-Based Services Implemented in a Microservices Architecture Using a Trusted Platform Module Applied to Electric Vehicle Charging Stations

open access: yesEnergies, 2023
Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations.
Antonio J. Cabrera-Gutiérrez   +5 more
doaj   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare

open access: yesSN Computer Science, 2022
This article presents the first-ever hardware-assisted blockchain for simultaneously handling device and data security in smart healthcare. This article presents the hardware security primitive physical unclonable functions (PUF) and blockchain ...
Vishnu Bathalapalli   +4 more
semanticscholar   +1 more source

The system architecture of the Pocket Companion [PDF]

open access: yes, 1997
In the Moby Dick project we design the architecture of a so-called Pocket Companion. It is a small personal portable computer with wireless communication facilities for every day use.
Havinga, Paul J.M., Smit, Gerard J.M.
core   +2 more sources

Design of a secure encryption circuit for SHE specification

open access: yesDianzi Jishu Yingyong
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj   +1 more source

FPGA-Based Hardware Encryption of Power Line Patrol Drones

open access: yesZhongguo dianli, 2019
Communication of power line patrol UAV is currently protected with frequency hopping. However, malicious adversaries can steal sequence of frequency hopping and control the patrol UAV. In view of the security protection needs of patrol UAV in the process
Hao LUO   +4 more
doaj   +1 more source

Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms

open access: yesCryptography, 2023
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for ...
Yamin Li
doaj   +1 more source

CamFlow: Managed Data-sharing for Cloud Services

open access: yes, 2015
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy