نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2016
Jianfei Zhou

Software-defined network structure of the network fundamental changes, its network equipment to achieve the hardware and software isolation and virtualization technology underlying hardware, so as to further development of the network provides a platform. This is due to the hardware and software isolation, making the network more vulnerable to attack, thus changing the topology and business inf...

2015
Nabil Ghanmy Lamia Chaari Fourati Lotfi Kamoun

Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN). Make available these two services by using symmetric cryptosystems in software implementation are challenging that’s not providing a perfect trade-off between resilience and performance. Asymmetric approaches with public key cryptosystems, specifically Ellipti...

2011
Adnan Abdul-Aziz Gutub

Cryptography and Security hardware designing is in continues need for efficient power utilization which is previously achieved by giving a range of trade-off between speed and power consumption. This paper presents the idea of considering subthreshold SRAM memory modules to gain ultra-low-power capable systems. The paper proposes modifying available crypto security hardware architectures to rec...

2007
Hirotaka Yoshida Dai Watanabe Katsuyuki Okeya Jun Kitahara Hongjun Wu Özgül Küçük Bart Preneel

This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 256-bit message block and a 256-bit chaining variable as input and produces a 256-bit output. Seen in the light of attacks on MD5 and SHA-1, our design strategy enables us to evaluate the security of MAME against known ...

Journal: :Inf. Manag. Comput. Security 2013
Joshua Arvin S. Lat Rod Xavier R. Bondoc Kevin Charles V. Atienza

The SOUL System is a secure online authentication system involving a two-factor authentication scheme that uses a password and an ordinary hardware device as security token. The three main parts of the system include the website, the ordinary hardware device, and a trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party ...

Journal: :J. Network and Computer Applications 2010
Bruno P. S. Rocha Daniel N. O. Costa Rande A. Moreira Cristiano G. Rezende Antonio Alfredo Ferreira Loureiro Azzedine Boukerche

The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for mobile users and applications. Security requirements for each application are different, as well ...

2006
Patrick Reynolds Oliver Kennedy Emin Gün Sirer Fred B. Schneider

Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...

2011
Alexandra Dmitrienko Zecir Hadzic Hans Löhr Marcel Winandy Ahmad-Reza Sadeghi

Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the har...

2014
Vincent van der Leest Roel Maes Geert Jan Schrijen Pim Tuyls

More and more mobile device manufacturers are recognizing the importance of security for their devices in order to protect valuable information of their customers. However, the security of many mobile devices currently does not suffice to protect against modern sophisticated attackers. This paper will go into detail on how these devices can be secured at the hardware level, to ensure that the d...

1999
Tanguy Gilmont Jean-Didier Legat Jean-Jacques Quisquater

We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides multitasking and v irtual memory support is extended and given a third purpose: to supply strong hardware security support for the software layer. The principle of this e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید