نتایج جستجو برای: tamper

تعداد نتایج: 2422  

Journal: :I. J. Network Security 2018
Ahmed A. Elngar

Security of networks is the most important challenge of the Internet of Things (IoT) that need smarter security mechanisms. Therefore, a tamper detection (TD) is an efficient security mechanism based on networks of IoT for healthcare applications, which used to deal with security violations. In this paper, a new TD mechanism based IoT for real data of healthcare application called (IOTTD) model...

2003
G. Edward Suh Dwaine Clarke Blaise Gassend Marten van Dijk Srinivas Devadas

We describe the architecture of the aegis processor which can be used to build computing systems secure against both physical and software attacks. aegis assumes that the operating system and all components external to it, such as memory, are untrusted. aegis provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be dete...

Journal: :International Journal of Computer Applications 2013

Journal: :Arab Journal of Nuclear Sciences and Applications 2019

Journal: :International Journal of Computer Applications 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید