Literatura académica sobre el tema "Hardware Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Hardware Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Hardware Security"
Polian, Ilia. "Hardware-oriented security". it - Information Technology 61, n.º 1 (25 de febrero de 2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.
Texto completoHunter, Philip. "Hardware-based security". Computer Fraud & Security 2004, n.º 2 (febrero de 2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.
Texto completoSengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]". IEEE Consumer Electronics Magazine 6, n.º 1 (enero de 2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.
Texto completoJin, Yier. "Introduction to Hardware Security". Electronics 4, n.º 4 (13 de octubre de 2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.
Texto completoKoushanfar, Farinaz y Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, n.º 9 (septiembre de 2010): 1. http://dx.doi.org/10.1145/1866978.1866979.
Texto completoFox, Dirk. "Hardware Security Module (HSM)". Datenschutz und Datensicherheit - DuD 33, n.º 9 (septiembre de 2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.
Texto completoGuin, Ujjwal, Navid Asadizanjani y Mark Tehranipoor. "Standards for Hardware Security". GetMobile: Mobile Computing and Communications 23, n.º 1 (24 de julio de 2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.
Texto completoSidhu, Simranjeet, Bassam J. Mohd y Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans". Journal of Sensor and Actuator Networks 8, n.º 3 (10 de agosto de 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Texto completoAdlkofer, Hans. "Safety and Security Need Hardware". ATZelectronics worldwide 16, n.º 10 (octubre de 2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.
Texto completoD.S, Suresh y V. Udayashankara. "External Hardware Security for Steganography". i-manager's Journal on Future Engineering and Technology 2, n.º 2 (15 de enero de 2007): 17–22. http://dx.doi.org/10.26634/jfet.2.2.874.
Texto completoTesis sobre el tema "Hardware Security"
Kalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Texto completoThe use of hardware security for telemetry in satellites utilized for intelligence and defense applications is well known. Less common is the use of hardware security in ground-based computers hosting applications that post process telemetry data. Analysis reveals vulnerabilities in software only security solutions that can result in the compromise of telemetry data housed on ground-based computer systems. Such systems maybe made less susceptible to compromise with the use of hardware based security.
Chakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation". Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Texto completoDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Tselekounis, Ioannis. "Cryptographic techniques for hardware security". Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33148.
Texto completoEdmison, Joshua Nathaniel. "Hardware Architectures for Software Security". Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29244.
Texto completoPh. D.
Leonhard, Julian. "Analog hardware security and trust". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.
Texto completoThe ongoing globalization and specialization of the integrated circuit (IC) supply chain has led semiconductor companies to share their valuable intellectual property (IP) assets with numerous parties for means of manufacturing, testing, etc. As a consequence, sensitive IPs and ICs are being exposed to untrusted parties, resulting in serious piracy threats such as counterfeiting or reverse engineering. In this thesis we develop methods to secure analog and mixed signal IPs/ICs from piracy threats within the supply chain. We propose an anti-piracy methodology for locking mixed-signal ICs via logic locking of their digital part. Furthermore, we propose an anti-reverse engineering methodology camouflaging the effective geometry of layout components. Finally, we propose an attack to break all analog circuit locking techniques that act upon the biasing of the circuit. The presented techniques have the potential to protect analog and mixed-signal circuits against a large subset of all the possible risk scenarios while inflicting low overheads in terms of area, power and performance
Bilzor, Michael B. "Defining and enforcing hardware security requirements". Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10741.
Texto completoSekar, Sanjana. "Logic Encryption Methods for Hardware Security". University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1505124923353686.
Texto completoXue, Hao. "Hardware Security and VLSI Design Optimization". Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1546466777397815.
Texto completoValea, Emanuele. "Security Techniques for Test Infrastructures". Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS042.
Texto completoTest infrastructures are crucial to the modern Integrated Circuits (ICs) industry. The necessity of detecting manufacturing defects and preventing system failures in the field, makes their presence inevitable in every IC and its sub-modules. Unfortunately, test infrastructures also represent a security threat due to the augmented controllability and observability on the IC internals that they typically provide. In this thesis, we present a comprehensive analysis of the existing threats and the respective countermeasures, also providing a classification and a taxonomy of the state-of-the-art. Furthermore, we propose new security solutions, based on lightweight cryptography, for the design of test infrastructures. All proposed countermeasures belong to the category of scan encryption solutions and their purpose is to guarantee data confidentiality and user authentication. Each proposed solution is evaluated in terms of implementation costs and security capabilities. The works that have been carried out and are presented in this thesis, indicate that scan encryption is a promising solution for granting a secure design of test infrastructures
Wenhua, Qi, Zhang Qishan y Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM". International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Texto completoSecurity hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Libros sobre el tema "Hardware Security"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha y Farimah Farahmandi. Hardware Security Primitives. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-19185-5.
Texto completoSadeghi, Ahmad-Reza y David Naccache, eds. Towards Hardware-Intrinsic Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3.
Texto completoSklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale y Francesco Regazzoni, eds. Hardware Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.
Texto completoHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Texto completoFarahmandi, Farimah, M. Sazadur Rahman, Sree Ranjani Rajendran y Mark Tehranipoor. CAD for Hardware Security. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26896-0.
Texto completoTehranipoor, Mark, ed. Emerging Topics in Hardware Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64448-2.
Texto completoKatkoori, Srinivas y Sheikh Ariful Islam, eds. Behavioral Synthesis for Hardware Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-78841-4.
Texto completoMishra, Prabhat, Swarup Bhunia y Mark Tehranipoor, eds. Hardware IP Security and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0.
Texto completoTehranipoor, Mark, N. Nalla Anandakumar y Farimah Farahmandi. Hardware Security Training, Hands-on! Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31034-8.
Texto completoKelly, Wayne. Security hardware and security system planning for museums. Ottawa, Ont: Canadian Conservation Institute, 1998.
Buscar texto completoCapítulos de libros sobre el tema "Hardware Security"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha y Farimah Farahmandi. "Analog Security". En Hardware Security Primitives, 245–60. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_14.
Texto completoSommerhalder, Maria. "Hardware Security Module". En Trends in Data Protection and Encryption Technologies, 83–87. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_16.
Texto completoHuffmire, Ted, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner y Timothy Sherwood. "Hardware Security Challenges". En Handbook of FPGA Design Security, 71–85. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9157-4_3.
Texto completoMavrovouniotis, Stathis y Mick Ganley. "Hardware Security Modules". En Secure Smart Embedded Devices, Platforms and Applications, 383–405. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_17.
Texto completoTuyls, Pim. "Hardware Intrinsic Security". En Radio Frequency Identification: Security and Privacy Issues, 123. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16822-2_11.
Texto completoSustek, Laurent. "Hardware Security Module". En Encyclopedia of Cryptography and Security, 535–38. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_509.
Texto completoBertino, Elisa, Sonam Bhardwaj, Fabrizio Cicala, Sishuai Gong, Imtiaz Karim, Charalampos Katsis, Hyunwoo Lee, Adrian Shuai Li y Ashraf Y. Mahgoub. "Hardware Security Analysis". En Synthesis Lectures on Information Security, Privacy, and Trust, 71–77. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-28259-1_5.
Texto completoDöttling, Nico, Daniel Kraschewski, Jörn Müller-Quade y Tobias Nilges. "From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions". En Provable Security, 23–42. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26059-4_2.
Texto completoTehranipoor, Mark, Nitin Pundir, Nidish Vashistha y Farimah Farahmandi. "Intrinsic Racetrack PUF". En Hardware Security Primitives, 1–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_1.
Texto completoTehranipoor, Mark, Nitin Pundir, Nidish Vashistha y Farimah Farahmandi. "Fault Injection Resistant Cryptographic Hardware". En Hardware Security Primitives, 333–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_19.
Texto completoActas de conferencias sobre el tema "Hardware Security"
Sadeghi, Ahmad-Reza. "Hardware-Assisted Security". En CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3139324.3139326.
Texto completoLeef, Serge. "Hardware cyber security". En the 2014. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2560519.2565868.
Texto completoChandra, Vikas y Rob Aitken. "Mobile hardware security". En 2014 IEEE Hot Chips 26 Symposium (HCS). IEEE, 2014. http://dx.doi.org/10.1109/hotchips.2014.7478796.
Texto completoLee, Ruby, Simha Sethumadhavan y G. Edward Suh. "Hardware enhanced security". En the 2012 ACM conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2382196.2382323.
Texto completoBurleson, Wayne y Yusuf Leblebici. "Hardware security in VLSI". En the 21st edition of the great lakes symposium. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1973009.1973109.
Texto completoTsvetanov, Filip. "Sensor network hardware security". En THE 9TH INTERNATIONAL CONFERENCE OF THE INDONESIAN CHEMICAL SOCIETY ICICS 2021: Toward a Meaningful Society. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0099518.
Texto completoGu, Jie y Carlos Tokunaga. "Session details: Hardware Security". En ISLPED '16: International Symposium on Low Power Electronics and Design. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3256017.
Texto completoChan, Philip, Thomas Barnett, Abdel-Hameed Badawy y Patrick W. Jungwirth. "Cyber defense through hardware security". En Disruptive Technologies in Information Sciences, editado por Misty Blowers, Russell D. Hall y Venkateswara R. Dasari. SPIE, 2018. http://dx.doi.org/10.1117/12.2302805.
Texto completo"2.2 Special session: Hardware security". En 2014 International Conference on Field-Programmable Technology (FPT). IEEE, 2014. http://dx.doi.org/10.1109/fpt.2014.7082767.
Texto completoLo, Dan Chia-Tien, Kai Qian y Wei Chen. "Hardware Attacks and Security Education". En 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.128.
Texto completoInformes sobre el tema "Hardware Security"
Souppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320b.
Texto completoSouppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320.
Texto completoBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320c.ipd.
Texto completoBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.ir.8320d.ipd.
Texto completoBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8320d.
Texto completoMell, Peter. Hardware Security Failure Scenarios:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8517.ipd.
Texto completoBartock, Michael, Murugiah Souppaya, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi y Karen Scarfone. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, junio de 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Texto completoNguyen, Thuy D., Timothy E. Levin, Cynthia E. Irvin, Terry V. Benzel y Ganesha Bhaskara. Preliminary Security Requirements for SecureCore Hardware. Fort Belvoir, VA: Defense Technical Information Center, septiembre de 2006. http://dx.doi.org/10.21236/ada457517.
Texto completoKastner, Ryan y Ted Huffmire. Threats and Challenges in Reconfigurable Hardware Security. Fort Belvoir, VA: Defense Technical Information Center, julio de 2008. http://dx.doi.org/10.21236/ada511928.
Texto completoRushby, John. Formally Verified Hardware Encapsulation Mechanism for Security, Integrity, and Safety. Fort Belvoir, VA: Defense Technical Information Center, abril de 2002. http://dx.doi.org/10.21236/ada403303.
Texto completo