Results 81 to 90 of about 809,010 (236)

Digital IP Protection Using Threshold Voltage Control

open access: yes, 2016
This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG).
Davis, Joseph   +4 more
core   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Rapid mapping of digital integrated circuit logic gates via multi-spectral backside imaging [PDF]

open access: yes, 2016
Modern semiconductor integrated circuits are increasingly fabricated at untrusted third party foundries. There now exist myriad security threats of malicious tampering at the hardware level and hence a clear and pressing need for new tools that enable ...
Adato, Ronen   +6 more
core  

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents [PDF]

open access: yes, 2019
Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.
Jha, Susmit   +3 more
core  

Deep Space Network Radio Science and Ground‐Based Planetary Radar in the Next Decade

open access: yesRadio Science, Volume 60, Issue 7, July 2025.
Abstract The Deep Space Network (DSN) has been a core operational element of NASA's crewed and robotic exploration of the Solar System since the early 1960s. The primary role of the DSN has been to acquire telemetry and navigation data, but over the years, its radiometric and radar capabilities have expanded to form a system for obtaining unique ...
R. S. Park   +13 more
wiley   +1 more source

Desktop security as a three-dimensional problem [PDF]

open access: yes, 2005
In this paper we argue against viewing computer desktop security solely as a technical issue. Instead, we propose a perspective that combines three related dimensions: technical infrastructure, usability and user engagement.
Weir, G.R.S., Zonidis, N.
core  

Greening the Gulf? Renewables, Fossil Capitalism and the ‘East–East’ Axis of World Energy

open access: yesDevelopment and Change, Volume 56, Issue 4-5, Page 957-981, July-September 2025.
ABSTRACT This article examines the place of the Gulf Cooperation Council states in the global energy transition, with a focus on the recent and rapid expansion of renewable energy in the region. It argues that much like at the global scale, the energy transition in the Gulf is an additive process, one that superimposes renewable energy on growing ...
Adam Hanieh
wiley   +1 more source

Security Analysis of Hardware Trojans on Approximate Circuits

open access: yesACM Great Lakes Symposium on VLSI, 2020
Approximate computing, for error-tolerant applications, provides trade-offs for computations to achieve improved speed and power performance. Approximate circuits, in particular approximate arithmetic circuits, directly affect the performance of a ...
Yuqin Dou   +5 more
semanticscholar   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Creating a blockchain platform: An empirical analysis in the Italian banking sector

open access: yesCreativity and Innovation Management, Volume 34, Issue 2, Page 393-413, June 2025.
Digital platforms continue to be a focal point for scholars and practitioners, with growing attention being paid to the dynamics that shape platform leadership. Against this backdrop, blockchain technology emerges for its disruptive potential, offering attractive opportunities for collaboration through shared infrastructure, and arguably remodelling ...
Giacomo Vella, Luca Gastaldi
wiley   +1 more source

Home - About - Disclaimer - Privacy