نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

1999
Sergio Loureiro Refik Molva

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The sec...

2010
Susana Eiroa Iluminada Baturone Antonio J. Acosta Jorge Dávila

Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety. However, their nature as well as early stage of study makes them constitute currently a diverse and non-standardized set for designers. This work tries to establish one organization of existing PUF structures, giving guidelines for the...

2005
Olga Gelbart Paul Ott Bhagirath Narahari Rahul Simha Alok N. Choudhary Joseph Zambreno

The science of security informatics has become a rapidly growing field involving different branches of computer science and information technologies. Software protection, particularly for security applications, has become an important area in computer security. This paper proposes a joint compiler/hardware infrastructure CODESSEAL for software protection for fully encrypted execution in which b...

1999
Sergio Loureiro Refik Molva

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The sec...

2013
Il-Soo Jeon Eun-Jun Yoon

The security of RFID systems is a very important issue in the applications of RFID systems. Developing of authentication protocols is a general solution to * Corresponding author: e-mail: [email protected] (Eun-Jun Yoon) 3434 Il-Soo Jeon and Eun-Jun Yoon resist security attacks. However, since low-cost RFID tags have very limited hardware resources, it is not easy to develop an authentication pr...

2015
Jaime Espinosa

The steady reduction of transistor size has brought embedded solutions into everyday life. However, the same features of deep-submicron technologies that are increasing the application spectrum of these solutions are also negatively affecting their dependability. Current practices for the design and deployment of hardware fault tolerance and security strategies remain in practice specific (defi...

2016
Maththaiya Durai Behnam S. Arad

Data security is a major concern for everyone in today’s informational world. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It is one of the major information security solutions. Hash Stream1-Synthetic Initialization Vector (HS1-SIV) is a recently developed and fast encryption algorithm. In this paper1, we present a hardwar...

2010
Hamid Reza Naji

Fusion of cooperative intelligent sensor nodes in a distributed environment can provide a high performance event monitoring system mainly for security issues. Partitioning the hardware design space into entities called agents, which are autonomous units of execution that have the capability of interacting with the environment and each other has been made much more attractive by the recent advan...

2013
Pierre Bayon Lilian Bossuet Alain Aubert Viktor Fischer

True random number generators (TRNGs) are significant piece of hardware security that are used to generate secret keys, initial values or random masks for counter measures against side-channel attacks. Thus the security of implementation in hardware of such block is crucial. The work presented in this paper show that it is possible to find information on a TRNG using its electromagnetic radiati...

2010
Nguyen Hieu Minh Nguyen Thien Luan

This paper proposes a new block cipher called KT-64. We make a cipher using components that are believed secure. The structure of KT-64 is very simple, strong and efficient. We use the controlled substitution-permutation networks (CSPNs) based on controlled elements (CEs) for designing fast block cipher suitable to cheap hardware implementation. Security estimations of KT64 cipher show that pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید