Hardware security

Results: 1760



#Item
121

READY Secure USB 3.0 Portable Hard Drive With real-time XTS-AES 256-bit hardware encryption, software free design and a super speed USB 3.0 connection, the perfect blend of security, durability

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2015-08-10 08:35:57
    122

    Introduction Underlying Mathematical Components Specification Security Theorems and Security Bounds Properties Hardware Results

    Add to Reading List

    Source URL: www.cryptoexperts.com

    Language: English - Date: 2015-11-13 04:48:41
      123

      http://www.cs.ucsb.edu/~sherwood/RCsec/ A 3-Pronged Approach to Adaptive Security and Separation in Reconfigurable Hardware Blurring the line between software and hardware, reconfigurable devices strive to strike a bala

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:20
        124Computer hardware / Computing / Apple Inc. / Computer peripherals / Classes of computers / Personal computing / Laptop / Door / Computer monitor / Apple Keyboard / Computer keyboard / IPad

        IN T EG R AT E Wall Charting and Computing Stations Integrate Wall Cabinets provide space efficient security and storage for monitors, keyboards, laptops, scanners, CPUs, and medical charts. Engineered for healthcare env

        Add to Reading List

        Source URL: www.peterpepper.com

        Language: English - Date: 2015-01-23 09:41:30
        125

        Synology DS214SE ohne HDD Hardware HDD-Käfig - 2x 2,5" oder 3,5" SATA II (max. 2x 6 TB)

        Add to Reading List

        Source URL: www.lowcost-security.ch

        Language: German - Date: 2015-09-22 04:45:05
          126

          Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware Thomas P¨oppelmann and Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security, Ruhr University Bochum, Germany

          Add to Reading List

          Source URL: www.sha.rub.de

          Language: English - Date: 2013-08-14 17:59:02
            127

            Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture Sebastian Vogl and Claudia Eckert {vogls,eckertc}@in.tum.de Chair for IT Security Technische Universität München

            Add to Reading List

            Source URL: www.syssec-project.eu

            Language: English - Date: 2012-04-16 07:03:12
              128

              INVASIVE ATTACKS ALIENS ? HARDWARE SECURITY

              Add to Reading List

              Source URL: www.cryptoexperts.com

              - Date: 2015-11-13 04:48:40
                129

                Adaptive Security and Separation in Reconfigurable Hardware Award No:

                Add to Reading List

                Source URL: www.cisr.us

                Language: English - Date: 2007-11-15 12:21:16
                  UPDATE