Results 41 to 50 of about 8,466 (185)

Design of a secure encryption circuit for SHE specification

open access: yesDianzi Jishu Yingyong
To enhance the defense capability of automotive system information security, a secure encryption circuit is designed for secure hardware extensions specification.
Shi Xingqiang, Liu Mengying, Wang Fenfen
doaj   +1 more source

Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices [PDF]

open access: yes2019 15th European Dependable Computing Conference (EDCC), 2019
Toubkal is a new hardware architecture which provides secure, efficient and flexible hardware isolation. It is a modular system that offers strong separation of different hardware modules within a system. Lightweight devices use mainly a Memory Protection Unit (MPU) to protect the memory and create an isolation architecture.
David Hely   +2 more
openaire   +2 more sources

Insider Attack Model Against HSM-Based Architecture

open access: yesIEEE Access, 2023
Data security is an increasingly important issue in 2023. Whether about user privacy, data availability, or integrity, consumer information is getting targeted by cyber-pirates for various motives.
Marc Dib, Samuel Pierre
doaj   +1 more source

An embedded DSP hardware encryption module for secure e‐commerce transactions [PDF]

open access: yesSecurity and Communication Networks, 2010
AbstractCryptography is one of the key elements in providing security for modern e‐commerce systems. It is well known that software‐based encryption has built‐in security weaknesses due to storing and managing digital certificates/keys in a high‐risk environment such as a local hard disk or software.
Xuan Dau Hoang   +2 more
openaire   +1 more source

Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case [PDF]

open access: gold, 2023
Antonio Cabrera   +5 more
openalex   +1 more source

Survey of security for Android smart terminal

open access: yesTongxin xuebao, 2016
Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the ...
Yan-ping XU   +4 more
doaj   +2 more sources

High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj   +1 more source

The acoustic encryption transmission system based on improved DEA

open access: yesDianzi Jishu Yingyong, 2019
The system adopts the improved data encryption algorithm(DEA), and the hardware encryption system is constructed by complex programmable logic device(CPLD) chip EPM570.
Shan Huilin, Zhang Yinsheng
doaj   +1 more source

Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules

open access: yes, 2022
Garbling schemes are useful building blocks for enabling secure multi-party computation (MPC), but require considerable computational resources both for the garbler and the evaluator. Thus, they cannot be easily used in a resource-restricted setting, e.g. on mobile devices.
Doerner, Dominik   +2 more
openaire   +3 more sources

Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions

open access: yesSensors, 2018
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Rosario Arjona   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy