Hardware security

Results: 1760



#Item
181

Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints

Add to Reading List

Source URL: ieee-security.org

- Date: 2012-05-22 01:32:56
    182

    Semi-Invasive Attacks – A New Approach to Hardware Security Analysis Sergei P. Skorobogatov Summary Semiconductor chips are used today not only to control systems, but also to protect them against security threats. A c

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2004-09-22 11:09:37
      183

      LNCSAlgorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering

      Add to Reading List

      Source URL: cs.brown.edu

      - Date: 2004-04-27 14:43:57
        184

        2011 IEEE Symposium on Security and Privacy Silencing Hardware Backdoors Adam Waksman Simha Sethumadhavan

        Add to Reading List

        Source URL: ieee-security.org

        - Date: 2011-04-10 18:06:50
          185

          2011 IEEE Symposium on Security and Privacy Silencing Hardware Backdoors Adam Waksman Simha Sethumadhavan

          Add to Reading List

          Source URL: www.ieee-security.org

          - Date: 2011-04-10 18:06:50
            186

            TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality Sumeet Bajaj Stony Brook University

            Add to Reading List

            Source URL: www.ieee-security.org

            Language: English - Date: 2012-05-15 22:37:47
              187

              Usb Smartcardlezer Driver Resource Up-date Failing to have your security signaled, means you has to digitally support a new hardware. Every file maybe pressd online, while you neglect to alter your DOS along your compute

              Add to Reading List

              Source URL: www.etf.ee

              Language: English - Date: 2014-12-09 17:48:38
                188

                NEWCASTLE UNIVERSITY INFORMATION SECURITY GUIDELINES Version 3 Staff and Students using Newcastle University’s Information Assets (computers, hardware, networks, software and all of the data they contain) are required

                Add to Reading List

                Source URL: www.ncl.ac.uk

                Language: English - Date: 2015-03-27 12:46:42
                  189

                  2014 IEEE Security and Privacy Workshops Using Existing Hardware Services for Malware Detection. Sarat Kompalli, Intel Corporation

                  Add to Reading List

                  Source URL: www.ieee-security.org

                  Language: English - Date: 2014-04-30 03:10:29
                    190Computing / OpenDNSSEC / Domain Name System Security Extensions / Hardware security module / NLnet / KASP / Creative Commons / Domain name system / Internet / Network architecture

                    OpenDNSSEC Slides based on material from the OpenDNSSEC project team © NLnet Labs, Licensed under a Creative Commons Attribution 3.0 Unported License. Tuesday, February 7, 12

                    Add to Reading List

                    Source URL: www.dns-school.org

                    Language: English - Date: 2014-11-25 09:41:03
                    UPDATE