Results 81 to 90 of about 809,010 (236)
Digital IP Protection Using Threshold Voltage Control
This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG).
Davis, Joseph +4 more
core +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
Rapid mapping of digital integrated circuit logic gates via multi-spectral backside imaging [PDF]
Modern semiconductor integrated circuits are increasingly fabricated at untrusted third party foundries. There now exist myriad security threats of malicious tampering at the hardware level and hence a clear and pressing need for new tools that enable ...
Adato, Ronen +6 more
core
TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit +3 more
core
Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park +13 more
wiley +1 more source
Desktop security as a three-dimensional problem [PDF]
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement.
Weir, G.R.S., Zonidis, N.
core
Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley +1 more source
Security Analysis of Hardware Trojans on Approximate Circuits
Approximate computing, for error-tolerant applications, provides trade-offs for computations to achieve improved speed and power performance. Approximate circuits, in particular approximate arithmetic circuits, directly affect the performance of a ...
Yuqin Dou +5 more
semanticscholar +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
Creating a blockchain platform: An empirical analysis in the Italian banking sector
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley +1 more source

