Results 61 to 70 of about 8,466 (185)

Feasible Analysis on Hardware Security Module With Digital Voice Assistants Device

open access: gold, 2022
Rizzo Mungka Anak Rechie   +3 more
openalex   +1 more source

The Role of Hardware Security Modules (HSMs) in Modern Data Protection Strategies

open access: yes, 2020
As data breaches and cyber threats continue to escalate, robust security measures are essential for safeguarding sensitive information in today’s digital landscape. Hardware Security Modules (HSMs) have become a critical component of modern data protection strategies. This paper explores the vital role of HSMs in managing encryption keys, ensuring data
openaire   +2 more sources

Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency

open access: yesApplied Sciences
Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not ...
Zhiwei Jin   +3 more
doaj   +1 more source

Research on area-efficient low-entropy masking scheme for AES

open access: yesTongxin xuebao, 2019
Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling ...
Jiuxing JIANG   +4 more
doaj   +2 more sources

Golden Chip-Free Hardware Trojan Detection Using Attention-Based Non-Local Convolution With Simple Recurrent Unit

open access: yesIEEE Access
The globalization of the semiconductor industry introduces vulnerabilities like hardware Trojans that compromise hardware security and pose serious risks to critical applications such as military and medical systems. Traditional hardware Trojan detection
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

Dual system trusted terminal computing architecture based on TPCM RoT

open access: yesTongxin xuebao
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui   +3 more
doaj  

Ceremonies Design for PKI's Hardware Security Modules

open access: bronze, 2009
Jean Everson Martina   +2 more
openalex   +2 more sources

Virtual and Distributed Hardware Security Module for Secure Key Management

open access: yes
Tese de mestrado, Engenharia Informática , 2024, Universidade de Lisboa, Faculdade de ...
openaire   +1 more source

An efficient signature aggregation scheme with antenna hardware implementation for VANETs. [PDF]

open access: yesSci Rep
Priyadharshini A   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy