نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2012
Sabrina De Capitani di Vimercati Pierangela Samarati Sushil Jajodia

Journal: :IEEE Pervasive Computing 2003
Paris Kitsos Nicolas Sklavos Kyriakos Papadomanolakis Odysseas G. Koufopavlou

S ecurity in pervasive computing is a complex issue that has been the subject of negative publicity in recent years due to poor implementations (such as the Wired Equivalent Privacy protocol used by IEEE 802.11). Many low-level protocols are not secure, and the use of more secure high-level protocols is limited by the processing capabilities of mobile devices. Bluetooth could enhance and extend...

Journal: :IEEE Transactions on Emerging Topics in Computing 2014

Journal: :ACM Journal on Emerging Technologies in Computing Systems 2016

Journal: :IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2021

This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS SYSTEMS (JETCAS) is dedicated to demonstrating latest research progress in area hardware security emerging technologies.

Journal: :IEEE Transactions on Communications 2021

Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency energy efficiency. Motivated by this fact, we consider an NOMA system in presence of a malicious eavesdropper. Under realistic assumptions residual hardware impairments (RHIs), channel estimation errors (C...

2015
Sheng Wei

Integrated circuits (ICs) are the fundamental building blocks of essentially all computer or electronic systems. While outsourcing has become a trend in the IC industry to reduce the manufacturing cost, an untrusted foundry that has full access to the hardware may easily compromise the security of the manufactured ICs, such as embedding hardware Trojans. Due to the presence of process variation...

2006
Michael Dalton Hari Kannan Christos Kozyrakis Minos Crandall

Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system state, low overheads for security checks, and, in some cases, compatibility with legacy binaries. Nev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید