نتایج جستجو برای: hardware security
تعداد نتایج: 279905 فیلتر نتایج به سال:
S ecurity in pervasive computing is a complex issue that has been the subject of negative publicity in recent years due to poor implementations (such as the Wired Equivalent Privacy protocol used by IEEE 802.11). Many low-level protocols are not secure, and the use of more secure high-level protocols is limited by the processing capabilities of mobile devices. Bluetooth could enhance and extend...
This Special Issue of the IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS SYSTEMS (JETCAS) is dedicated to demonstrating latest research progress in area hardware security emerging technologies.
Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency energy efficiency. Motivated by this fact, we consider an NOMA system in presence of a malicious eavesdropper. Under realistic assumptions residual hardware impairments (RHIs), channel estimation errors (C...
Integrated circuits (ICs) are the fundamental building blocks of essentially all computer or electronic systems. While outsourcing has become a trend in the IC industry to reduce the manufacturing cost, an untrusted foundry that has full access to the hardware may easily compromise the security of the manufactured ICs, such as embedding hardware Trojans. Due to the presence of process variation...
Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system state, low overheads for security checks, and, in some cases, compatibility with legacy binaries. Nev...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید