Results 71 to 80 of about 263,653 (212)
Efficient Low-Latency Hardware Architecture for Module-Lattice-Based Digital Signature Standard
The rapid advancement of powerful quantum computers poses a significant security risk to current public-key cryptosystems, which heavily rely on the computational complexity of problems such as discrete logarithms and integer factorization.
Quang Dang Truong +2 more
semanticscholar +1 more source
Research of a trusted execution environment module for multiple platforms
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG +4 more
doaj +2 more sources
Electronic Voting Using Identity Domain Separation and Hardware Security Modules [PDF]
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed.
openaire +1 more source
An IoT-Based Motorcycle Security System Using Arduino and Android for Theft Prevention
Motorcycle theft remains a prevalent issue, especially in urban areas, where traditional security measures such as mechanical locks and ignition keys are easily bypassed. This research presents an IoT-based motorcycle security system integrating Arduino,
Aris Rakhmadi +4 more
doaj +1 more source
Raspberry Pi-Based Face Recognition Door Lock System
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for ...
Seifeldin Sherif Fathy Ali Elnozahy +2 more
doaj +1 more source
Design and implementation of modular home security system with short messaging system
Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home.
Budijono Santoso +2 more
doaj +1 more source
Hardware Security Module Cryptosystem Using Petri Net
Billel Guechi, Mohammed Redjimi
openaire +1 more source
High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks, especially in ...
Amael, Joshua Tito +2 more
openaire +2 more sources
Linux: About Trusted Boot Loader’s Startup
The paper is about terminus “trusted startup” in the context of Linux operating systems and default Linux boot loaders. The author describes necessity of additional configuration in Linux boot loaders in order to provide trusted OS startup.
Andrey Mikhailovich Kanner
doaj
Computer network big data detection based on internet of things technology
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj +1 more source

