Results 51 to 60 of about 263,653 (212)
Development and Performance Evaluation of a Connected Vehicle Application Development Platform (CVDeP) [PDF]
Connected vehicle (CV) application developers need a development platform to build, test and debug real-world CV applications, such as safety, mobility, and environmental applications, in edge-centric cyber-physical systems.
Chowdhury, Mashrur +4 more
core
A new Definition and Classification of Physical Unclonable Functions
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core +1 more source
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
A Model-Based Approach to Security Analysis for Cyber-Physical Systems
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios +3 more
core +1 more source
Fine recycled concrete aggregate as a material replacement in concrete production [PDF]
As a fast and rapid growing nation, Malaysia undergoes a lot of development especially in construction field. Most of the building nowadays are being made mainly using concrete as it provides many favorable features such as satisfactory compressive ...
Shahidan, Shahiron +2 more
core
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Highly-Efficient Hardware Architecture for ML-KEM PQC Standard
The advent of quantum computers, with their immense computational potential, poses significant threats to traditional cryptographic systems. In response, NIST announced the quantum-resistant Module Lattice-based Key Encapsulation Mechanism (ML-KEM ...
Haesung Jung +2 more
doaj +1 more source
A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj +1 more source
Survey of security for Android smart terminal
Aiming at the security,the layered security system was constructed.Firstly,the devices safety protection based on remote anti-theft,biometric identity verification and hardware security module was expounded.Secondly,network security referring to the ...
Yan-ping XU +4 more
doaj +2 more sources
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source

