نتایج جستجو برای: hardware security

تعداد نتایج: 279905  

2010
Shiu-Kai Chin

Designers, auditors, and certifiers of trustworthy systems must rigorously assess compliance with security policies. Because security is best built into systems at all levels of abstraction, engineers and other practitioners who design, verify, or certify trustworthy systems need the capability to reason rigorously about security policies in general, and access decisions in particular. What is ...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2018

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2016

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

2012
Jens Rohrbeck Vlado Altmann Stefan Pfeiffer Peter Danielis Jan Skodzik Dirk Timmermann Matthias Ninnemann Maik Rönnau

Providing network security is one of the most important tasks in todays Internet. Unfortunately, many users are not able to protect themselves and their networks. Therefore, a novel security concept is presented to protect users by providing security measures at the Internet Service Provider level. Already now, Internet Service Providers are using different security measures, e.g., Virtual Loca...

2014
Satyajeet Nimgaonkar Mahadevan Gomathisankaran Saraju Mohanty

Security is a primary concern in this era of pervasive computing. Software-only protection mechanisms provide inadequate security as the Operating System becomes the root of trust and also due to their inability to guard against physical attacks on computing devices. On the contrary, hardware based security mechanisms facilitate the construction of trustworthy secure systems. However, existing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید