نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

Journal: :Int. J. Reconfig. Comp. 2010
Stephanie Drzevitzky Uwe Kastens Marco Platzner

Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems. The capability to load hardware modules at runtime provides these systems with an unparalleled degree of adaptivity but at the same time poses new challenges for security and safety. In this paper, we elaborate on the presentation of proof carrying hard...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

2017
Johannes Blömer Peter Günther Volker Krummel Nils Löken

In this work, we propose a service infrastructure that provides confidentiality of data in the cloud. It enables information sharing with fine-grained access control among multiple tenants based on attributebased encryption. Compared to the standard approach based on access control lists, our encryption as a service approach allows us to use cheap standard cloud storage in the public cloud and ...

2013
Swarup Bhunia Leyla Nazhandali

h SECURITY OF ELECTRONIC hardware at different stages of its life cycle has emerged as a paramount concern to integrated circuits (ICs) designers, system integrators, as well as to the end users. Over time, hardware components, platforms and supply chains have been considered secure and trustworthy. However, recent discoveries and reports on security vulnerabilities with attacks in microchips a...

2013
Darmawan Suwirya Karen Lu Laurent Castillo

Web applications that require higher levels of security have various security options that can be deployed on the server. However providing security on the client consuming the service remains a challenge especially when the application runs in a web browser. While various types of security hardware can work with the user's computer, there is no convenient way for web applications to access suc...

2006
Yehuda Lindell

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................

2011
Xu Wu

Recently, there are many trust management solutions are proposed for wireless sensor networks. Current decentralized trust-management research focuses mainly on trust models and algorithms, whereas trust evaluation isn’t related with certainty specific application. But, in WSNs the trust management solutions should adapt to different application scenarios. In addition, potential merits of hardw...

2014
Parnian Najafi Borazjani Christopher E. Everett George Mason Damon McCoy

Security research and training using cyber-physical systems (e.g., automotive networks) is challenging because of the need to replicate the interactions between the hardware components and the control software of the systems. These interactions are challenging to replicate due to dynamic inputs in real-world environments that cause various interactions of hardware components and control softwar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید