نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

2003
Cynthia E. Irvine David J. Shifflett Paul C. Clark Timothy E. Levin George W. Dinolt

The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanisms for the protection of distributed multi-domain computing environments from malicious code and other attacks. These security services and mechanisms extend and interoperate with existing workstations, applications an...

2003
Adrian Baldwin Simon Shiu

Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty. This paper describes an approach to using such hardwar...

2011
Hongzhi Liu Xin Ye

For lack of resources for IP address and the Network attack become diversity, the NAT technology is used for address extension. So, the requirement of Network security is improved. This paper mainly research on the security policy of NAT, and proposes Intrusion Redirect, protection of the Network effectively. Base on Apriori mining, proposes Interest association rules for the IDS Intrusion log ...

Journal: :Electronics 2021

Improving the security of electronic devices that support innovative critical services (digital administrative services, e-health, e-shopping, and on-line banking) is essential to lay foundations a secure digital society. Security schemes based on Physical Unclonable Functions (PUFs) take advantage intrinsic characteristics hardware for online generation unique identifiers cryptographic keys al...

2014
Jeyavijayan Rajendran

1 Motivation Electronic devices are increasingly used for high-performance applications, such as data centers and networking, as well as energy-constrained applications, such as medical implants and sensors. In many of these applications, security and privacy of user data and computation are required and are usually enforced in software. However, enforcing security and privacy in hardware has g...

2012
Rajesh Kumar I. M. Talwar Eugene Y. Vasserman Nicholas James Tyra

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

2005
Jon-Olov Vatn

With the introduction of IP based telephony services, the Internet has started to challenge the traditional PSTN networks as an infrastructure for providing real-time interactive services. This upcoming paradigm shift is not only driven by the desire to provide cost efficient solutions, but by basing the communication on IP we expect that the end-users will experience a greater set of attractiv...

2000
Joshua D. Guttman

This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in September 2000. It has two main purposes. The first purpose is to explain how to model and analyze two important security problems, and how to derive systematic solutions to them. One problem area is the “packet protect...

2002
Sergio Loureiro Laurent Bussard Yves Roudier

This paper addresses mobile code protection with respect to potential integrity and confidentiality violations originating from the untrusted runtime environment where the code execution takes place. Both security properties are defined in a framework where code is modeled using Boolean circuits. Two protection schemes are presented. The first scheme addresses the protection of a function that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید