Siga este enlace para ver otros tipos de publicaciones sobre el tema: Hardware Security.

Artículos de revistas sobre el tema "Hardware Security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hardware Security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Polian, Ilia. "Hardware-oriented security". it - Information Technology 61, n.º 1 (25 de febrero de 2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hunter, Philip. "Hardware-based security". Computer Fraud & Security 2004, n.º 2 (febrero de 2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]". IEEE Consumer Electronics Magazine 6, n.º 1 (enero de 2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Jin, Yier. "Introduction to Hardware Security". Electronics 4, n.º 4 (13 de octubre de 2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Koushanfar, Farinaz y Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, n.º 9 (septiembre de 2010): 1. http://dx.doi.org/10.1145/1866978.1866979.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Fox, Dirk. "Hardware Security Module (HSM)". Datenschutz und Datensicherheit - DuD 33, n.º 9 (septiembre de 2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Guin, Ujjwal, Navid Asadizanjani y Mark Tehranipoor. "Standards for Hardware Security". GetMobile: Mobile Computing and Communications 23, n.º 1 (24 de julio de 2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Sidhu, Simranjeet, Bassam J. Mohd y Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans". Journal of Sensor and Actuator Networks 8, n.º 3 (10 de agosto de 2019): 42. http://dx.doi.org/10.3390/jsan8030042.

Texto completo
Resumen
Security of IoT devices is getting a lot of attention from researchers as they are becoming prevalent everywhere. However, implementation of hardware security in these devices has been overlooked, and many researches have mainly focused on software, network, and cloud security. A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware. This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough. These devices must be protected against sophisticated attacks, especially if the groundwork for the attacks is already laid in devices during design or manufacturing process, such as with HTs. This paper will discuss the stealthy nature of these HT, highlight HT taxonomy and insertion methods, and provide countermeasures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Adlkofer, Hans. "Safety and Security Need Hardware". ATZelectronics worldwide 16, n.º 10 (octubre de 2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

D.S, Suresh y V. Udayashankara. "External Hardware Security for Steganography". i-manager's Journal on Future Engineering and Technology 2, n.º 2 (15 de enero de 2007): 17–22. http://dx.doi.org/10.26634/jfet.2.2.874.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Kitsos, P., N. Sklavos, K. Papadomanolakis y O. Koufopavlou. "Hardware implementation of bluetooth security". IEEE Pervasive Computing 2, n.º 1 (enero de 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Labrado, Carson y Himanshu Thapliyal. "Hardware Security Primitives for Vehicles". IEEE Consumer Electronics Magazine 8, n.º 6 (1 de noviembre de 2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Perez, Ronald, Leendert van Doorn y Reiner Sailer. "Virtualization and Hardware-Based Security". IEEE Security & Privacy Magazine 6, n.º 5 (septiembre de 2008): 24–31. http://dx.doi.org/10.1109/msp.2008.135.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Pang, Yachuan, Bin Gao, Bohan Lin, He Qian y Huaqiang Wu. "Memristors for Hardware Security Applications". Advanced Electronic Materials 5, n.º 9 (24 de abril de 2019): 1800872. http://dx.doi.org/10.1002/aelm.201800872.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Edwards, Chris. "Automation Key to Hardware Security". New Electronics 55, n.º 10 (octubre de 2022): 28–29. http://dx.doi.org/10.12968/s0047-9624(23)60439-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Zhang, Zhiming y Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems". Journal of Low Power Electronics and Applications 8, n.º 4 (27 de noviembre de 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.

Texto completo
Resumen
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary of energy-efficiency techniques that have been applied in security primitives or mechanisms to ensure computing systems’ resilience against various security threats on hardware. This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Souren, Joseph. "Security by design: hardware-based security in Windows 8". Computer Fraud & Security 2013, n.º 5 (mayo de 2013): 18–20. http://dx.doi.org/10.1016/s1361-3723(13)70046-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

IKEDA, Makoto. "Secure LSI Design: Solutions to Hardware Security and Hardware Vulnerability". IEICE ESS Fundamentals Review 12, n.º 2 (1 de octubre de 2018): 126–32. http://dx.doi.org/10.1587/essfr.12.2_126.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Hu, Wei, Armaiti Ardeshiricham y Ryan Kastner. "Hardware Information Flow Tracking". ACM Computing Surveys 54, n.º 4 (mayo de 2021): 1–39. http://dx.doi.org/10.1145/3447867.

Texto completo
Resumen
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification, testing, manufacturing, and deployment of hardware circuits. Hardware IFT can detect unintentional design flaws, malicious circuit modifications, timing side channels, access control violations, and other insecure hardware behaviors. This article surveys the area of hardware IFT. We start with a discussion on the basics of IFT, whose foundations were introduced by Denning in the 1970s. Building upon this, we develop a taxonomy for hardware IFT. We use this to classify and differentiate hardware IFT tools and techniques. Finally, we discuss the challenges yet to be resolved. The survey shows that hardware IFT provides a powerful technique for identifying hardware security vulnerabilities, as well as verifying and enforcing hardware security properties.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Gunn, Lachlan J., N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani y Thomas Nyman. "Hardware Platform Security for Mobile Devices". Foundations and Trends® in Privacy and Security 3, n.º 3-4 (2022): 214–394. http://dx.doi.org/10.1561/3300000024.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Yoshida, Kota y Takeshi Fujino. "Hardware Security on Edge AI Devices". IEICE ESS Fundamentals Review 15, n.º 2 (1 de octubre de 2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Yang, Kun, Haoting Shen, Domenic Forte, Swarup Bhunia y Mark Tehranipoor. "Hardware-Enabled Pharmaceutical Supply Chain Security". ACM Transactions on Design Automation of Electronic Systems 23, n.º 2 (24 de enero de 2018): 1–26. http://dx.doi.org/10.1145/3144532.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Nightingale, Edmund B., Daniel Peek, Peter M. Chen y Jason Flinn. "Parallelizing security checks on commodity hardware". ACM SIGARCH Computer Architecture News 36, n.º 1 (25 de marzo de 2008): 308–18. http://dx.doi.org/10.1145/1353534.1346321.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Nightingale, Edmund B., Daniel Peek, Peter M. Chen y Jason Flinn. "Parallelizing security checks on commodity hardware". ACM SIGOPS Operating Systems Review 42, n.º 2 (25 de marzo de 2008): 308–18. http://dx.doi.org/10.1145/1353535.1346321.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Nightingale, Edmund B., Daniel Peek, Peter M. Chen y Jason Flinn. "Parallelizing security checks on commodity hardware". ACM SIGPLAN Notices 43, n.º 3 (25 de marzo de 2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Gong, Yanping, Fengyu Qian y Lei Wang. "Probabilistic Evaluation of Hardware Security Vulnerabilities". ACM Transactions on Design Automation of Electronic Systems 24, n.º 2 (21 de marzo de 2019): 1–20. http://dx.doi.org/10.1145/3290405.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Granado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez y Juan A. Gómez-Pulido. "Hardware security platform for multicast communications". Journal of Systems Architecture 60, n.º 1 (enero de 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Casinghino, Chris. "A Language for Programmable Hardware Security". ACM SIGAda Ada Letters 39, n.º 1 (10 de enero de 2020): 71. http://dx.doi.org/10.1145/3379106.3379115.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Gilmont, T., J. D. Legat y J. J. Quisquater. "Hardware security for software privacy support". Electronics Letters 35, n.º 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Stiles, Doug. "The Hardware Security Behind Azure Sphere". IEEE Micro 39, n.º 2 (1 de marzo de 2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools". International Research Journal of Innovations in Engineering and Technology 08, n.º 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.

Texto completo
Resumen
Hardware security in the cyber security domain had become a more of a controversial topic over the past decade due to the introduction of new design technologies in semiconductors and expansion of global supplier chains. In proportion to the technological advancement of hardware production, the success rate of the existing hardware attacks had also evolved over the time with a significantly high rate of emergence of new attacking techniques and methods. Computing hardware is becoming a more and more attractive attack surface due to several reasons. The technology of analyzing the hardware components is becoming more and more affordable and accessible to the general public than before. Also due to the influx of IoT devices in the market, trend of simplifying the design structure to decrease the power consumption and maximizing the processing speed has become the theme of modern hardware implementations rather than the security of the devices. When considering the market demand and user requirements, it is more obvious for the computer manufacturers to give priority to user requirements rather than stressing more on the security aspects of their designs and devices. But there could be some catastrophic outcomes if the security aspects of these hardware tends to fail in a critical infrastructure, because these semiconductors are used in devices ranging from simple IoT devices to more complex systems like SCADA systems. Therefore, it is always a better approach to find a balance ground between the user requirement as well as the security of the hardware, without compromising either of both in the design and development. In this article, it presents an overall insight to trends in Hardware Security domain, specifically related to modern computer hardware design and manufacturing processes, distribution, usage, their disposal and recycling. These various stages are analyzed under Three main objectives of exposing the threats to computer hardware, suggesting countermeasures to minimize or eliminate those threats and discussing about the utilization of various design tools that can assist in the way to securing these computer hardware systems in their day-to-day applications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Popat, Jayesh y Usha Mehta. "Hardware Security in Case of Scan Based Attack on Crypto Hardware". International Journal of VLSI Design & Communication Systems 9, n.º 2 (30 de abril de 2018): 01–10. http://dx.doi.org/10.5121/vlsic.2018.9201.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Kalathil Nandalal, Devika y Ramesh Bhakthavatchalu. "Design of programmable hardware security modules for enhancing blockchain based security framework". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 3 (1 de junio de 2023): 3178. http://dx.doi.org/10.11591/ijece.v13i3.pp3178-3191.

Texto completo
Resumen
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Zhang, Qian, Sujay Charania, Stefan Rothe, Nektarios Koukourakis, Niels Neumann, Dirk Plettemeier y Juergen W. Czarske. "Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication". Sensors 23, n.º 13 (1 de julio de 2023): 6076. http://dx.doi.org/10.3390/s23136076.

Texto completo
Resumen
Following Moore’s law, the density of integrated circuits is increasing in all dimensions, for instance, in 3D stacked chip networks. Amongst other electro-optic solutions, multimode optical interconnects on a silicon interposer promise to enable high throughput for modern hardware platforms in a restricted space. Such integrated architectures require confidential communication between multiple chips as a key factor for high-performance infrastructures in the 5G era and beyond. Physical layer security is an approach providing information theoretic security among network participants, exploiting the uniqueness of the data channel. We experimentally project orthogonal and non-orthogonal symbols through 380 μm long multimode on-chip interconnects by wavefront shaping. These interconnects are investigated for their uniqueness by repeating these experiments across multiple channels and samples. We show that the detected speckle patterns resulting from modal crosstalk can be recognized by training a deep neural network, which is used to transform these patterns into a corresponding readable output. The results showcase the feasibility of applying physical layer security to multimode interconnects on silicon interposers for confidential optical 3D chip networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Henkel, Jorg. "Top Picks in Hardware and Embedded Security". IEEE Design & Test 38, n.º 3 (junio de 2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Tanjidur Rahman, M. y Navid Asadizanjani. "Failure Analysis for Hardware Assurance and Security". EDFA Technical Articles 21, n.º 3 (1 de agosto de 2019): 16–24. http://dx.doi.org/10.31399/asm.edfa.2019-3.p016.

Texto completo
Resumen
Abstract This article presents a comprehensive study of physical inspection and attack methods, describing the approaches typically used by counterfeiters and adversaries as well as the risks and threats created. It also explains how physical inspection methods can serve as trust verification tools and provides practical guidelines for making hardware more secure.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Lamparth, Oliver y Frank Bähren. "Hardware and Software Security in Infotainment Systems". Auto Tech Review 4, n.º 12 (diciembre de 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Mathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang y Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive". ACM Transactions on Embedded Computing Systems 14, n.º 3 (21 de mayo de 2015): 1–20. http://dx.doi.org/10.1145/2736285.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Stitt, Greg, Robert Karam, Kai Yang y Swarup Bhunia. "A Uniquified Virtualization Approach to Hardware Security". IEEE Embedded Systems Letters 9, n.º 3 (septiembre de 2017): 53–56. http://dx.doi.org/10.1109/les.2017.2679183.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Lotz, V., V. Kessler y G. H. Walter. "A formal security model for microprocessor hardware". IEEE Transactions on Software Engineering 26, n.º 8 (2000): 702–12. http://dx.doi.org/10.1109/32.879809.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Jäppinen, Pekka y Mikko Lampi. "Hardware Cost Measurement of Lightweight Security Protocols". Wireless Personal Communications 71, n.º 2 (20 de octubre de 2012): 1479–86. http://dx.doi.org/10.1007/s11277-012-0886-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Lamparth, Oliver y Frank Bähren. "Hardware and Software Security in Infotainment Systems". ATZelektronik worldwide 10, n.º 3 (30 de mayo de 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Mannan, Mohammad y N. Asokan. "Confronting the Limitations of Hardware-Assisted Security". IEEE Security & Privacy 18, n.º 5 (septiembre de 2020): 6–7. http://dx.doi.org/10.1109/msec.2020.3015413.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Huffmire, Ted, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Brett Brotherton, Gang Wang, Timothy Sherwood y Ryan Kastner. "Security Primitives for Reconfigurable Hardware-Based Systems". ACM Transactions on Reconfigurable Technology and Systems 3, n.º 2 (mayo de 2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Smith, S. "Magic boxes and boots: security in hardware". Computer 37, n.º 10 (octubre de 2004): 106–9. http://dx.doi.org/10.1109/mc.2004.170.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Zic, John J., Martin de Groot, Dongxi Liu, Julian Jang y Chen Wang. "Hardware Security Device Facilitated Trusted Energy Services". Mobile Networks and Applications 17, n.º 4 (14 de marzo de 2012): 564–77. http://dx.doi.org/10.1007/s11036-012-0363-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Kitsos, P., N. Sklavos y O. Koufopavlou. "UMTS security: system architecture and hardware implementation". Wireless Communications and Mobile Computing 7, n.º 4 (2007): 483–94. http://dx.doi.org/10.1002/wcm.367.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Kumar, Niraj, Vishnu Mohan Mishra y Adesh Kumar. "Smart grid security with AES hardware chip". International Journal of Information Technology 12, n.º 1 (11 de abril de 2018): 49–55. http://dx.doi.org/10.1007/s41870-018-0123-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

John, Lizy Kurian. "Hardware Security and Privacy: Threats and Opportunities". IEEE Micro 43, n.º 5 (septiembre de 2023): 4–5. http://dx.doi.org/10.1109/mm.2023.3304091.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Barua, Anomadarshi y Mohammad Abdullah Al Faruque. "Hardware/Software Co-Design for Sensor Security". Computer 56, n.º 5 (mayo de 2023): 122–25. http://dx.doi.org/10.1109/mc.2023.3248779.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía