Artículos de revistas sobre el tema "Hardware Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hardware Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Polian, Ilia. "Hardware-oriented security." it - Information Technology 61, no. 1 (2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.
Texto completoHunter, Philip. "Hardware-based security." Computer Fraud & Security 2004, no. 2 (2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.
Texto completoSengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]." IEEE Consumer Electronics Magazine 6, no. 1 (2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.
Texto completoJin, Yier. "Introduction to Hardware Security." Electronics 4, no. 4 (2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.
Texto completoKoushanfar, Farinaz, and Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, no. 9 (2010): 1. http://dx.doi.org/10.1145/1866978.1866979.
Texto completoFox, Dirk. "Hardware Security Module (HSM)." Datenschutz und Datensicherheit - DuD 33, no. 9 (2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.
Texto completoGuin, Ujjwal, Navid Asadizanjani, and Mark Tehranipoor. "Standards for Hardware Security." GetMobile: Mobile Computing and Communications 23, no. 1 (2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.
Texto completoQin, Maoyuan, Jiale Li, Jiaqi Yan, Zishuai Hao, Wei Hu, and Baolong Liu. "HT-PGFV: Security-Aware Hardware Trojan Security Property Generation and Formal Security Verification Scheme." Electronics 13, no. 21 (2024): 4286. http://dx.doi.org/10.3390/electronics13214286.
Texto completoSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Texto completoAdlkofer, Hans. "Safety and Security Need Hardware." ATZelectronics worldwide 16, no. 10 (2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.
Texto completoD.S, Suresh, and V. Udayashankara. "External Hardware Security for Steganography." i-manager's Journal on Future Engineering and Technology 2, no. 2 (2007): 17–22. http://dx.doi.org/10.26634/jfet.2.2.874.
Texto completoKitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.
Texto completoLabrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Texto completoPerez, Ronald, Leendert van Doorn, and Reiner Sailer. "Virtualization and Hardware-Based Security." IEEE Security & Privacy Magazine 6, no. 5 (2008): 24–31. http://dx.doi.org/10.1109/msp.2008.135.
Texto completoPang, Yachuan, Bin Gao, Bohan Lin, He Qian, and Huaqiang Wu. "Memristors for Hardware Security Applications." Advanced Electronic Materials 5, no. 9 (2019): 1800872. http://dx.doi.org/10.1002/aelm.201800872.
Texto completoEdwards, Chris. "Automation Key to Hardware Security." New Electronics 55, no. 10 (2022): 28–29. http://dx.doi.org/10.12968/s0047-9624(23)60439-0.
Texto completoZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Texto completoRamaswamy, Mithilesh. "Enhancing Security in Bring Your Own Device Environments (BYOD) with Trusted Platform Modules, Continuous Monitoring, and Hardware Security Modules." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem6838.
Texto completoSouren, Joseph. "Security by design: hardware-based security in Windows 8." Computer Fraud & Security 2013, no. 5 (2013): 18–20. http://dx.doi.org/10.1016/s1361-3723(13)70046-0.
Texto completoIKEDA, Makoto. "Secure LSI Design: Solutions to Hardware Security and Hardware Vulnerability." IEICE ESS Fundamentals Review 12, no. 2 (2018): 126–32. http://dx.doi.org/10.1587/essfr.12.2_126.
Texto completoHu, Wei, Armaiti Ardeshiricham, and Ryan Kastner. "Hardware Information Flow Tracking." ACM Computing Surveys 54, no. 4 (2021): 1–39. http://dx.doi.org/10.1145/3447867.
Texto completoSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Texto completoMD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.
Texto completoGunn, Lachlan J., N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and Thomas Nyman. "Hardware Platform Security for Mobile Devices." Foundations and Trends® in Privacy and Security 3, no. 3-4 (2022): 214–394. http://dx.doi.org/10.1561/3300000024.
Texto completoYoshida, Kota, and Takeshi Fujino. "Hardware Security on Edge AI Devices." IEICE ESS Fundamentals Review 15, no. 2 (2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.
Texto completoYang, Kun, Haoting Shen, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. "Hardware-Enabled Pharmaceutical Supply Chain Security." ACM Transactions on Design Automation of Electronic Systems 23, no. 2 (2018): 1–26. http://dx.doi.org/10.1145/3144532.
Texto completoNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGARCH Computer Architecture News 36, no. 1 (2008): 308–18. http://dx.doi.org/10.1145/1353534.1346321.
Texto completoNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGOPS Operating Systems Review 42, no. 2 (2008): 308–18. http://dx.doi.org/10.1145/1353535.1346321.
Texto completoNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGPLAN Notices 43, no. 3 (2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.
Texto completoGong, Yanping, Fengyu Qian, and Lei Wang. "Probabilistic Evaluation of Hardware Security Vulnerabilities." ACM Transactions on Design Automation of Electronic Systems 24, no. 2 (2019): 1–20. http://dx.doi.org/10.1145/3290405.
Texto completoGranado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.
Texto completoCasinghino, Chris. "A Language for Programmable Hardware Security." ACM SIGAda Ada Letters 39, no. 1 (2020): 71. http://dx.doi.org/10.1145/3379106.3379115.
Texto completoGilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.
Texto completoStiles, Doug. "The Hardware Security Behind Azure Sphere." IEEE Micro 39, no. 2 (2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.
Texto completoRajat, Suvra Das, and Ramakrishnan Shanmugavelan. "A systematic literature review of Security in Hardware: Hardware Trojans and Countermeasures in Semiconductor Designs." Journal of Scientific and Engineering Research 8, no. 11 (2021): 114–22. https://doi.org/10.5281/zenodo.10903196.
Texto completoPopat, Jayesh, and Usha Mehta. "Hardware Security in Case of Scan Based Attack on Crypto Hardware." International Journal of VLSI Design & Communication Systems 9, no. 2 (2018): 01–10. http://dx.doi.org/10.5121/vlsic.2018.9201.
Texto completoKalathil Nandalal, Devika, and Ramesh Bhakthavatchalu. "Design of programmable hardware security modules for enhancing blockchain based security framework." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3178. http://dx.doi.org/10.11591/ijece.v13i3.pp3178-3191.
Texto completoDevika, Kalathil Nandalal, and Bhakthavatchalu Ramesh. "Design of programmable hardware security modules for enhancing blockchain based security framework." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3178–91. https://doi.org/10.11591/ijece.v13i3.pp3178-3191.
Texto completoQIN, Maoyuan, Jiaying HOU, Jiale LI, Shibo TANG, and Yu TAI. "Register transfer level hardware design information flow modeling and security verification method." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 3 (2024): 506–13. http://dx.doi.org/10.1051/jnwpu/20244230506.
Texto completoZhang, Qian, Sujay Charania, Stefan Rothe, et al. "Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication." Sensors 23, no. 13 (2023): 6076. http://dx.doi.org/10.3390/s23136076.
Texto completoZeel, B. Dabhi, and Kulkarni Akanksha. "Data Security in Cloud Computing." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 982–86. https://doi.org/10.5281/zenodo.7505036.
Texto completoSaidov, Yaxshimurodbek Umidjonovich, Alimurod Aziz ogli Akbarov, Faxriddin Azamjon ogli Oripov, and Baxtigul Baxtiyor qizi Mustafoyeva. "HARDWARE SECURITY: DEFENDING AGAINST SIDE-CHANNEL ATTACKS." Innovative Development in Educational Activities 4, no. 3 (2025): 82–86. https://doi.org/10.5281/zenodo.15411952.
Texto completoMathew Sebastian. "Securing IoT devices: A comprehensive technical framework." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 334–40. https://doi.org/10.30574/wjarr.2025.26.2.1620.
Texto completoZHANG, Xige, Jiacheng ZHU, Jun MA, Lixiang SHEN, Jiahui ZHOU, and Dejun MU. "Hardware security and reliability verification based on fault propagation model." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 42, no. 1 (2024): 92–97. http://dx.doi.org/10.1051/jnwpu/20244210092.
Texto completoHenkel, Jorg. "Top Picks in Hardware and Embedded Security." IEEE Design & Test 38, no. 3 (2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.
Texto completoTanjidur Rahman, M., and Navid Asadizanjani. "Failure Analysis for Hardware Assurance and Security." EDFA Technical Articles 21, no. 3 (2019): 16–24. http://dx.doi.org/10.31399/asm.edfa.2019-3.p016.
Texto completoLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.
Texto completoMathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, and Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive." ACM Transactions on Embedded Computing Systems 14, no. 3 (2015): 1–20. http://dx.doi.org/10.1145/2736285.
Texto completoStitt, Greg, Robert Karam, Kai Yang, and Swarup Bhunia. "A Uniquified Virtualization Approach to Hardware Security." IEEE Embedded Systems Letters 9, no. 3 (2017): 53–56. http://dx.doi.org/10.1109/les.2017.2679183.
Texto completoLotz, V., V. Kessler, and G. H. Walter. "A formal security model for microprocessor hardware." IEEE Transactions on Software Engineering 26, no. 8 (2000): 702–12. http://dx.doi.org/10.1109/32.879809.
Texto completo