Results 51 to 60 of about 462,961 (193)

Watermarking Hardware IPs Using Design Parameter Driven Encrypted Dispersion Matrix With Eigen Decomposition Based Security Framework

open access: yesIEEE Access
In the present era of the global design supply chain, several untrustworthy entities can be involved. From an intellectual property (IP) vendor’s perspective, an attacker in the system-on-chip (SoC) integration house may pirate the design IP and ...
Anirban Sengupta, Aditya Anshul
doaj   +1 more source

Performance Analysis of Internet Key Exchange Algorithms on IPSec Security Association Initiation

open access: yesMATEC Web of Conferences, 2018
Naturally, the Internet as an open network allows millions of users to interact each other. Furthermore, the giant network vulnerable to various malicious activities that potentially causes many (losses) for both resources and humanity.
Praptodiyono Supriyanto   +4 more
doaj   +1 more source

'That plant is my ancestor'. The significance of intellectual property on food security in developing countries [PDF]

open access: yes, 2013
The global significance of intellectual property laws is familiar to most of those interested in this area of law. What might be less familiar is the impact of intellectual property on the issue of food security in developing countries.
Farran, Sue
core  

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

IP Soft Core Hardware Trojan Detection Method Based on Grayscale Graph Analysis [PDF]

open access: yesJisuanji gongcheng
With the refinement of the division of labor in chip design, manufacturing, and packaging processes, the use of third-party Intellectual Property(IP) soft cores for secondary development can significantly improve design efficiency and reduce duplication ...
Lin NI, Zihui LIU, Shuai ZHANG, Jiujiang HAN, Ming XIAN
doaj   +1 more source

A Blockchain-Based Traceable IP Copyright Protection Algorithm

open access: yesIEEE Access, 2020
Current Intellectual Property (IP) copyright protection technologies have low efficiency of authority management, traceability, and scalability. In this work, a blockchain-based IP copyright protection algorithm is proposed to address these issues by ...
Lijun Xiao   +4 more
doaj   +1 more source

Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec [PDF]

open access: yes, 2011
With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN.
Duquennoy, Simon   +3 more
core   +1 more source

Hardware Trojan Detection through Information Flow Security Verification

open access: yes, 2017
Semiconductor design houses are increasingly becoming dependent on third party vendors to procure intellectual property (IP) and meet time-to-market constraints.
Contreras, Gustavo   +5 more
core   +1 more source

Research on Manageable and Controllable Mobile VPDN Solution

open access: yesDianxin kexue, 2013
Mobile VPDN is also known as wireless IP private network or 3G IP private network.It offers data private network service based on 3G network to all enterprise customers.Key factors of mobile VPDN,such as flexible network building,the policies of security
Yue Huang, Yingqi Wei
doaj   +2 more sources

Analysis and improvement of the BACnet/IP based on identity authentication

open access: yesTongxin xuebao
To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the ...
Pengshou XIE   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy