Results 51 to 60 of about 8,466 (185)
The Importance of Hardware Security Modules (HSM) in Vaulting Solutions
Data protection is a critical priority in today's digital landscape. Vaulting solutions such as HashiCorp Vault and CyberArk Vault manage sensitive secrets, passwords, and cryptographic keys, but are only as secure as the mechanisms used to protect their encryption keys. This paper discusses the role of Hardware Security Modules (HSMs) in enhancing the
openaire +2 more sources
Research of a trusted execution environment module for multiple platforms
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG+4 more
doaj +2 more sources
An IoT-Based Motorcycle Security System Using Arduino and Android for Theft Prevention
Motorcycle theft remains a prevalent issue, especially in urban areas, where traditional security measures such as mechanical locks and ignition keys are easily bypassed. This research presents an IoT-based motorcycle security system integrating Arduino,
Aris Rakhmadi+4 more
doaj +1 more source
Design and implementation of modular home security system with short messaging system
Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home.
Budijono Santoso+2 more
doaj +1 more source
Hardware Security Module Cryptosystem Using Petri Net
Billel Guechi, Mohammed Redjimi
openalex +2 more sources
ASM: Augmented Security Module for Commercial IoT Devices
The rapid expansion of the Internet of Things (IoT) has led to increased concerns regarding the security of IoT systems. Attacks targeting IoT devices, such as code injection and code reuse, have become more sophisticated, compromising device control and
Heeseung Son+3 more
doaj +1 more source
Raspberry Pi-Based Face Recognition Door Lock System
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for ...
Seifeldin Sherif Fathy Ali Elnozahy+2 more
doaj +1 more source
Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module [PDF]
In this work, a photonic physical unclonable function module, based on an optical waveguide, is demonstrated. The physical scrambling mechanism is based on the random and complex coherent interference of high order optical transverse modes. The proposed scheme allows the generation of random bit- strings, through a simple wavelength tuning of the laser
Alexandros Fragkos+5 more
openaire +2 more sources
A Survey of the Sensitivities of Security Oriented Flip-Flop Circuits
Side channel attacks have become a major threat to hardware systems. Most modern digital IC designs utilize sequential elements which dominate the information leakage.
Itamar Levi+4 more
doaj +1 more source
Linux: About Trusted Boot Loader’s Startup
The paper is about terminus “trusted startup” in the context of Linux operating systems and default Linux boot loaders. The author describes necessity of additional configuration in Linux boot loaders in order to provide trusted OS startup.
Andrey Mikhailovich Kanner
doaj