Results 51 to 60 of about 462,961 (193)
In the present era of the global design supply chain, several untrustworthy entities can be involved. From an intellectual property (IP) vendor’s perspective, an attacker in the system-on-chip (SoC) integration house may pirate the design IP and ...
Anirban Sengupta, Aditya Anshul
doaj +1 more source
Performance Analysis of Internet Key Exchange Algorithms on IPSec Security Association Initiation
Naturally, the Internet as an open network allows millions of users to interact each other. Furthermore, the giant network vulnerable to various malicious activities that potentially causes many (losses) for both resources and humanity.
Praptodiyono Supriyanto +4 more
doaj +1 more source
'That plant is my ancestor'. The significance of intellectual property on food security in developing countries [PDF]
The global significance of intellectual property laws is familiar to most of those interested in this area of law. What might be less familiar is the impact of intellectual property on the issue of food security in developing countries.
Farran, Sue
core
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources
IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj +1 more source
A Blockchain-Based Traceable IP Copyright Protection Algorithm
Current Intellectual Property (IP) copyright protection technologies have low efficiency of authority management, traceability, and scalability. In this work, a blockchain-based IP copyright protection algorithm is proposed to address these issues by ...
Lijun Xiao +4 more
doaj +1 more source
Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec [PDF]
With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN.
Duquennoy, Simon +3 more
core +1 more source
Hardware Trojan Detection through Information Flow Security Verification
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo +5 more
core +1 more source
Research on Manageable and Controllable Mobile VPDN Solution
Mobile VPDN is also known as wireless IP private network or 3G IP private network.It offers data private network service based on 3G network to all enterprise customers.Key factors of mobile VPDN,such as flexible network building,the policies of security
Yue Huang, Yingqi Wei
doaj +2 more sources
Analysis and improvement of the BACnet/IP based on identity authentication
To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the ...
Pengshou XIE +5 more
doaj +2 more sources

