Results 61 to 70 of about 8,466 (185)
Feasible Analysis on Hardware Security Module With Digital Voice Assistants Device
Rizzo Mungka Anak Rechie+3 more
openalex +1 more source
The Role of Hardware Security Modules (HSMs) in Modern Data Protection Strategies
As data breaches and cyber threats continue to escalate, robust security measures are essential for safeguarding sensitive information in today’s digital landscape. Hardware Security Modules (HSMs) have become a critical component of modern data protection strategies. This paper explores the vital role of HSMs in managing encryption keys, ensuring data
openaire +2 more sources
Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency
Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not ...
Zhiwei Jin+3 more
doaj +1 more source
Research on area-efficient low-entropy masking scheme for AES
Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling ...
Jiuxing JIANG+4 more
doaj +2 more sources
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj +1 more source
Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui+3 more
doaj
Ceremonies Design for PKI's Hardware Security Modules
Jean Everson Martina+2 more
openalex +2 more sources
Virtual and Distributed Hardware Security Module for Secure Key Management
Tese de mestrado, Engenharia Informática , 2024, Universidade de Lisboa, Faculdade de ...
openaire +1 more source
An efficient signature aggregation scheme with antenna hardware implementation for VANETs. [PDF]
Priyadharshini A+4 more
europepmc +1 more source