نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

Journal: :Future Internet 2022

This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural models. With the increase in volume of exchanged data, IoT networks’ security has become crucial issue. Anomaly-based systems (IDS) machine learning have recently gained increased popularity due to their generation’s ability detect unseen attacks. However, deployment ...

2002
Adrian Baldwin Simon Shiu

Many important security properties can be gained by encrypting stored data. However, these properties can be significantly undermined if the encryption keys are not well managed. This paper discusses how encryption strategies can be used to provide stronger segregation of data, remove “back door” access to data, and to reduce the reliance and trust placed in administrators of SAN systems. The f...

Journal: :Trans. Computational Science 2010
Siddhartha Chhabra Yan Solihin Reshma Lal Matthew Hoekstra

Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has become even harder with the emergence of hardware at...

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

2008
Muhammad Amin Shabaz Khan Tamleek Ali Saleem Gul

Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence...

Journal: :Security and Communication Networks 2011
Jiankun Hu Xuan Dau Hoang Ibrahim Khalil

Cryptography is one of the key elements in providing security for modern e-commerce systems. It is well known that software-based encryption has built-in security weaknesses due to storing and managing digital certificates/keys in a highrisk environment such as a local hard disk or software. This makes embedded hardware encryption a superior solution. However, most existing embedded hardware en...

2006
Ravishankar K. Iyer

Security and reliability are the key attributes in building highly trusted systems. System security violations (e.g., unauthorized privileged access or the compromising of data integrity) and reliability failures can be caused by hardware problems (transient or intermittent), software bugs, resource exhaustion, environmental conditions, or any complex interaction among these factors. To build a...

Kooroush Manochehri Sahar Darvish Motevali

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

2007
Apostol T. Vassilev

Recently, people have begun to use OS virtualization as a tool for improving LAN security. While virtualization is very useful in optimizing hardware utilization, we show that its security benefits come at a price.

2000
Martin Reichenbach Torsten Grzebieta Torsten Költzsch Ingo Pippow

Despite existing security standards and security technologies, such as secure hardware, gaps between users’ demand for security and the security offered by a payment system can still remain. These security gaps imply risks for users. In this paper, we introduce a framework for the management of those risks. As a result, we present an instrument enabling users to evaluate eventual risks related ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید