Results 41 to 50 of about 263,653 (212)
SofTEE: Software-Based Trusted Execution Environment for User Applications
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj +1 more source
Microservice architectures exploit container-based virtualized services, which rarely use hardware-based cryptography. A trusted platform module (TPM) offers a hardware root for trust in services that makes use of cryptographic operations.
Antonio J. Cabrera-Gutiérrez +5 more
doaj +1 more source
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea +5 more
core +1 more source
Provable security against generic attacks on stream ciphers
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +1 more source
This article presents the first-ever hardware-assisted blockchain for simultaneously handling device and data security in smart healthcare. This article presents the hardware security primitive physical unclonable functions (PUF) and blockchain ...
Vishnu Bathalapalli +4 more
semanticscholar +1 more source
The system architecture of the Pocket Companion [PDF]
In the Moby Dick project we design the architecture of a so-called Pocket Companion. It is a small personal portable computer with wireless communication facilities for every day use.
Havinga, Paul J.M., Smit, Gerard J.M.
core +2 more sources
Design of a secure encryption circuit for SHE specification
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj +1 more source
FPGA-Based Hardware Encryption of Power Line Patrol Drones
Communication of power line patrol UAV is currently protected with frequency hopping. However, malicious adversaries can steal sequence of frequency hopping and control the patrol UAV. In view of the security protection needs of patrol UAV in the process
Hao LUO +4 more
doaj +1 more source
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for ...
Yamin Li
doaj +1 more source
CamFlow: Managed Data-sharing for Cloud Services
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean +3 more
core +2 more sources

