The K2 Architecture for Trustworthy Hardware Security Modules
Anish Athalye +3 more
openaire +2 more sources
Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui +3 more
doaj
Research on area-efficient low-entropy masking scheme for AES
Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling ...
Jiuxing JIANG +4 more
doaj
MIGS: A Modular Edge Gateway with Instance-Based Isolation for Heterogeneous Industrial IoT Interoperability. [PDF]
Ai Y, Zhu Y, Jiang Y, Deng Y.
europepmc +1 more source
RINAsense: An open-source, low-power IoT sensor node for Recursive InterNetwork Architecture (RINA) Experimentation. [PDF]
Sarabia-Jácome D, Grasa E, Catalán M.
europepmc +1 more source
Hardware Security Module Specifications
Report on HSM specifications and final design.
openaire +1 more source
AI- and Security-Empowered End-Edge-Cloud Modular Platform in Complex Industrial Processes: A Case Study on Municipal Solid Waste Incineration. [PDF]
Tang J, Wang T, Tian H, Yu W.
europepmc +1 more source
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems. [PDF]
Yan M, Crane G, Suillivan D, Shan H.
europepmc +1 more source
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
MC-LBTO: secure and resilient state-aware multi-controller framework with adaptive load balancing for SD-IoT performance optimization. [PDF]
Alyanbaawi A +5 more
europepmc +1 more source

