نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2004
Joseph Zambreno

Research into defense mechanisms for digital information has intensified in recent years, as malicious attacks on software systems have become a rapidly growing burden. The growing area of software protection attempts to address the problems of code understanding and code tampering along with related problems such as authorization. Our work focuses on the design and evaluation of an architectur...

Journal: :Trans. Computational Science 2010
Siddhartha Chhabra Yan Solihin Reshma Lal Matthew Hoekstra

Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has become even harder with the emergence of hardware at...

2005
Shenglan Hu Chris J. Mitchell

Existing techniques for IP address autoconfiguration in mobile ad hoc networks (MANETs) do not address security issues. In this paper, we first describe some of the existing IP address autoconfiguration schemes, and discuss their security shortcomings. We then provide solutions to these security issues based on the use of trust models. A specific trust model is also proposed for use in improvin...

Journal: :مطالعات حقوق خصوصی 0
ستار عزیزی

the convention on the prevention and punishment of the crime of genocide was adopted by the un general assembly in december 1948. in former yugoslavia and rwanda occurred many heinous crimes and majority ruling powers tried to destroy molem and totsi minority groups. the un security council established the international criminal tribunal for the former yugoslavia (icty) and rwanda (ictr). the u...

Journal: :IEEE Transactions on Education 2016

Journal: :Journal of Advances in Information Technology 2011

2017
Saraju P. Mohanty Anirban Sengupta Parthasarathy Guturu Elias Kougianos

This article presents a detailed discussion of various aspects of watermarking technologies on applications ranging from the embedding of marks in the pictorial information on paper, to hardware protection. Included in the present discussion are the general concepts, motivation for watermarking, analog versus digital watermarking, various applications of watermarking such as paper marks, curren...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Journal: :J. UCS 2012
Huansheng Ning Hong Liu Qing Liu Genlin Ji

The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the direct...

Journal: :Journal of Hardware and Systems Security 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید