Hardware security

Results: 1760



#Item
161Security Target / Evaluation Assurance Level / Common Criteria / Crime prevention / National security / Unidirectional network / Protection Profile / Computer security / Bartek / Evaluation / Security / Networking hardware

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification INTERNAL

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:44:03
162Rootkits / Spyware / Central processing unit / Cyberwarfare / Security / Computer security / Cryptography / Malware / Backdoor

Modern Hardware is Complex •  Modern systems built on layers of hardware Tamper Evident Microprocessors

Add to Reading List

Source URL: oakland10.cs.virginia.edu

Language: English - Date: 2010-05-25 18:37:01
163Internet protocols / Routing protocols / Internet standards / Border Gateway Protocol / Networking hardware / Internet backbone / Router / Backbone / Routing / Internet / Network architecture / Computing

Poster: Resilience of the Internet: the Case of the BGP Backbone Sylvain Frey, Awais Rashid, Yehia Elkhatib, Karolina Follis, John Vidler, Nick Race, Chris Edwards Lancaster University {s.frey,a.rashid,y.elkhatib,k.folli

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:30
164Telecommunications engineering / Electromagnetic radiation / Networking hardware / Computer network security / Wireless / Power over Ethernet / X-ray / Konica / Technology / Wireless networking / Radiography

High Image Quality & Lower Doses Easy Workflow Light -weight & Reliability & Durable

Add to Reading List

Source URL: www.konicaminolta.eu

Language: English - Date: 2012-10-14 14:42:20
165QEMU / Hyper-V / Hypervisor / Ring / Operating system / X86 / Xen / X Window System / System software / Software / Computer architecture

Poster: P ODA RCH: Protecting Legacy Applications with a Purely Hardware TCB Shweta Shinde1 , Shruti Tople1 , Deepak Kathayat2 , Prateek Saxena1 National University of Singapore1 , IIIT Hyderabad2 {shweta24, shruti90, pr

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:30
166Signal cables / Power cables / Electrical wiring / Construction / Graybar Electric Company / Networking hardware / Coaxial cable / Wire / Patch cable / Cables / Technology / Electromagnetism

Wire & cable solutions Commercial industrial - OEM residential security utility

Add to Reading List

Source URL: www.graybarcanada.com

Language: English - Date: 2013-08-02 12:05:50
167Mathematical model / Mathematical modeling / Computer hardware / Preference / Hewlett-Packard / Mathematical optimization / Economic model / Mathematics / Computing / Collective intelligence

Investments and Trade-offs in the Economics of Information Security Presentation and Suggestions for Future Directions Christos Ioannidis1 1 School

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2009-03-05 11:07:09
168Card reader / Access control / HID Global / Wiegand / Universal Serial Bus / Security / Computer hardware / MIFARE

IP Card Reader Interface User Manual  SB ResearchSB Research ApS • Birkholmsvej 33 • DK-2800 Kgs. Lyngby • Tel + • Fax +

Add to Reading List

Source URL: www.securityengineering.dk

Language: English - Date: 2015-01-23 06:08:03
169Espionage / Packaging / Disk encryption / Tamper resistance / Computer security / FIPS 140-2 / IBM / Data security / Encryption / Cryptography / Security / Technology

Trusted Hardware Radu Sion Stony Brook Trusted Hardware Laboratory An important part of the tutorial will lie in conveying the insights of how practical limitations of

Add to Reading List

Source URL: www.sigsac.org

Language: English - Date: 2008-10-06 10:03:17
170USB / Access control / Wiegand / Magnetic stripe card / MIFARE / Universal Serial Bus / Security / Computer hardware / Card reader

SBR 0902 – USB Desktop Reader Compact Design for easy registration of proximity access cards in access control software. The card reader interface connects to a pc via USBand the required driver is automatically

Add to Reading List

Source URL: www.securityengineering.dk

Language: English - Date: 2015-01-26 15:33:01
UPDATE