Hardware security

Results: 1760



#Item
491Universal Serial Bus / Intel / DisplayLink / SMS / USB / Computer hardware / Technology / Mobile technology

Universal Serial Bus Device Class Definition for Content Security Devices Content Security Framework

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-17 20:12:51
492Information technology management / Non-volatile memory / Data erasure / Computer storage / Data remanence / Disk formatting / File deletion / Disk encryption / Hard disk drive / Computer hardware / Computing / Data security

HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices.

Add to Reading List

Source URL: www.cannon4.com

Language: English - Date: 2011-03-15 13:38:09
493Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
494Computer security / Universal Serial Bus / USB flash drive / AutoPlay / USB / Autorun.inf / IEEE / Human interface device / Computer virus / Computer hardware / Computing / AutoRun

Beyond Autorun: Exploiting vulnerabilities with removable storage Jon Larimer IBM X-Force Advanced R&D

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:18
495Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-08 09:17:59
496Mechanical computers / Elliptic curves / Elliptic curve cryptography / Finite fields / Z2 / Z3 / Z1 / Elliptic curve point multiplication / Lookup table / Abstract algebra / History of computing hardware / Computing

On the Implementation of Unified Arithmetic on Binary Huff Curves Santosh Ghosh1⋆ , Amit Kumar2⋆⋆ , Amitabh Das3 , and Ingrid Verbauwhede3 1 Security and Privacy Research, Intel Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-12 13:10:28
497Physics / Digital Linear Tape / Coercivity / Magnet / Hard disk drive / Degaussing / Electromagnetism / Computer hardware / Computer storage media

Security Engineered Machinery HQ-WESTBORO, MAwww.semshred.com ) WASHINGTON, DC; SACRAMENTO, CA; SAVANNAH, GA; PHOENIX, AZ Model HD-2

Add to Reading List

Source URL: www.semshred.com

Language: English - Date: 2012-01-17 14:49:20
498Computer architecture / Networking hardware / Tunneling protocols / Network Address Translation / Network protocols / Allied Telesis / Virtual private network / NAT traversal / DSL modem / Computing / Computer network security / Network architecture

AlliedWareTM OS Overview of | VPN Solutions in How To Notes Introduction Allied Telesis offers How To Notes with a wide range of VPN solutions, from quick and simple solutions for connecting home and remote offices, to a

Add to Reading List

Source URL: alliedtelesis.eu

Language: English
499Computer network security / Hacking / Hardware Trojan / Vulnerability / Ring / Computer security / Cyberwarfare / Security

HOSTIEEE International Symposium on

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:13:58
500

Window Hardware Technical Information SECURITY FRICTION STAYS - DIMENSIONS Security Friction Stay

Add to Reading List

Source URL: www.avocet-hardware.co.uk

Language: English - Date: 2008-11-26 09:31:13
    UPDATE