Results 71 to 80 of about 263,653 (212)

Efficient Low-Latency Hardware Architecture for Module-Lattice-Based Digital Signature Standard

open access: yesIEEE Access
The rapid advancement of powerful quantum computers poses a significant security risk to current public-key cryptosystems, which heavily rely on the computational complexity of problems such as discrete logarithms and integer factorization.
Quang Dang Truong   +2 more
semanticscholar   +1 more source

Research of a trusted execution environment module for multiple platforms

open access: yesTongxin xuebao, 2014
The current TPM,MTM and other trusted computing modules don’t take into account the variety of platforms and the update of the inside algorithms,protocols and functions.A hardware trusted execution environment module (TEEM) architecture,which uses ARM ...
Qian-ying ZHANG   +4 more
doaj   +2 more sources

Electronic Voting Using Identity Domain Separation and Hardware Security Modules [PDF]

open access: yesInternational Journal of E-Adoption, 2009
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed.
openaire   +1 more source

An IoT-Based Motorcycle Security System Using Arduino and Android for Theft Prevention

open access: yesCompiler
Motorcycle theft remains a prevalent issue, especially in urban areas, where traditional security measures such as mechanical locks and ignition keys are easily bypassed. This research presents an IoT-based motorcycle security system integrating Arduino,
Aris Rakhmadi   +4 more
doaj   +1 more source

Raspberry Pi-Based Face Recognition Door Lock System

open access: yesIoT
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for ...
Seifeldin Sherif Fathy Ali Elnozahy   +2 more
doaj   +1 more source

Design and implementation of modular home security system with short messaging system

open access: yesEPJ Web of Conferences, 2014
Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home.
Budijono Santoso   +2 more
doaj   +1 more source

Hardware Security Module Cryptosystem Using Petri Net

open access: yesIndonesian Journal of Electrical Engineering and Informatics (IJEEI), 2023
Billel Guechi, Mohammed Redjimi
openaire   +1 more source

High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security

open access: yes
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing efficiency, these developments also bring negative impacts, such as increased cyber-attacks, especially in ...
Amael, Joshua Tito   +2 more
openaire   +2 more sources

Linux: About Trusted Boot Loader’s Startup

open access: yesБезопасность информационных технологий, 2013
The paper is about terminus “trusted startup” in the context of Linux operating systems and default Linux boot loaders. The author describes necessity of additional configuration in Linux boot loaders in order to provide trusted OS startup.
Andrey Mikhailovich Kanner
doaj  

Computer network big data detection based on internet of things technology

open access: yesMeasurement: Sensors
In order to solve the problems of traditional network security intrusion detection system in detection accuracy and missed detection rate, this paper proposes a computer network data detection based on Internet of things technology. This paper designs an
Fuhua Huo
doaj   +1 more source

Home - About - Disclaimer - Privacy