Hardware security

Results: 1760



#Item
151

Security for Complex Systems Definition of complex systems Diverse kinds of entities tightly coupled. Codes, hardware, user, network. Can’t worry about one aspect… creates blind spots. Poorly defined perimeter. Syste

Add to Reading List

Source URL: sos.cs.virginia.edu

Language: English - Date: 2008-11-21 11:08:58
    152Computing / Computer hardware / Technology / Smart cards / Centrifuges / Home automation / Laundry / Washing machine / Cash machine / Card reader / Maytag / USB

    Laundry Laundering: A Security Analysis of Laundromat Washing Machines at the University of Michigan Eric Wustrow, Jahan Khanna University of Michigan {ewust,jahan}@umich.edu Abstract

    Add to Reading List

    Source URL: ericw.us

    Language: English - Date: 2011-01-29 05:43:59
    153

    DIGIPASS DIGIPASS Nano Hardware based authentication with e-signature functionality for your mobile phone to address security challenges of mobile applications Mobile banking applications face multiple challenges. In or

    Add to Reading List

    Source URL: www.corex.at

    Language: English - Date: 2015-05-13 12:09:00
      154

      Distributed Intrusion Detection with Open Source Software and Commodity Hardware +

      Add to Reading List

      Source URL: security.vt.edu

      Language: English - Date: 2016-03-01 22:58:21
        155

        Offline Hard Disk Imaging Using write-blocking hardware and Helix CD Imaging Note: These commands assume sdb is evidence and sdc is image storage. 1. Find devices dmesg | grep hd

        Add to Reading List

        Source URL: www.security.vt.edu

        Language: English - Date: 2016-02-28 22:58:48
          156Computing / Network architecture / Computer network security / Network protocols / Computer networking / Networking hardware / Router / Server appliance / Port forwarding / Universal Plug and Play / IP address / Virtual Router Redundancy Protocol

          PDF Document

          Add to Reading List

          Source URL: cetoncorp.com

          Language: English - Date: 2013-01-17 16:01:28
          157Cryptography / Key management / Public-key cryptography / Key / Hardware security module / Session key / Derived unique key per transaction / Key generation

          PDF Document

          Add to Reading List

          Source URL: jda.noekeon.org

          Language: English - Date: 2013-08-28 07:53:10
          158IEEE standards / Security / MIFARE / Prevention / Networking hardware / Access control / Power over Ethernet / Ethernet

          PDF Document

          Add to Reading List

          Source URL: www.cemsys.com

          Language: English - Date: 2016-02-23 11:53:11
          159

          McAfee Protect your valuable business data against malicious viruses and malware attacks with world-class security services from McAfee. With no hardware to buy and no software to install, plus the benefit of automatic u

          Add to Reading List

          Source URL: www.centurylinkhostedservices.com

          Language: English
            160

            Brass Cylinders Security Hardware Cam and Specialty Lock Locksmith Supplies U.S. Dollars

            Add to Reading List

            Source URL: www.isi-security.com

            Language: English - Date: 2015-08-04 12:34:22
              UPDATE