Results 51 to 60 of about 263,653 (212)

Development and Performance Evaluation of a Connected Vehicle Application Development Platform (CVDeP) [PDF]

open access: yes, 2019
Connected vehicle (CV) application developers need a development platform to build, test and debug real-world CV applications, such as safety, mobility, and environmental applications, in edge-centric cyber-physical systems.
Chowdhury, Mashrur   +4 more
core  

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

open access: yes, 2018
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios   +3 more
core   +1 more source

Fine recycled concrete aggregate as a material replacement in concrete production [PDF]

open access: yes, 2020
As a fast and rapid growing nation, Malaysia undergoes a lot of development especially in construction field. Most of the building nowadays are being made mainly using concrete as it provides many favorable features such as satisfactory compressive ...
Shahidan, Shahiron   +2 more
core  

TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]

open access: yes, 2010
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core  

Highly-Efficient Hardware Architecture for ML-KEM PQC Standard

open access: yesIEEE Open Journal of Circuits and Systems
The advent of quantum computers, with their immense computational potential, poses significant threats to traditional cryptographic systems. In response, NIST announced the quantum-resistant Module Lattice-based Key Encapsulation Mechanism (ML-KEM ...
Haesung Jung   +2 more
doaj   +1 more source

A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]

open access: yesJisuanji gongcheng, 2017
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj   +1 more source

Survey of security for Android smart terminal

open access: yesTongxin xuebao, 2016
Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the ...
Yan-ping XU   +4 more
doaj   +2 more sources

High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj   +1 more source

Home - About - Disclaimer - Privacy