Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications
نویسندگان
چکیده
منابع مشابه
Nanoelectronic Solutions for Hardware Security
Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high energy and performance overhead. Further, emerging side channel and physical attacks can compromise classical security solutions. Hardware based security solutions overcome many of the...
متن کاملExploring a New Security Framework for Remote Patient Monitoring Devices
Security has been an issue of contention in healthcare. The lack of familiarity and poor implementation of security in healthcare leave the patients’ data vulnerable to attackers. The main issue is assessing how we can provide security in an RPM infrastructure. The findings in literature show there is little empirical evidence on proper implementation of security. Therefore, there is an urgent ...
متن کاملObject Segmentation Using Colour for Security Applications on Mobile Devices
This paper presents research-in-progress on a colour based method of object segmentation for use in biometric security methods on mobile devices. The limited processing capability of mobile devices has restricted the computational complexity of security algorithms that can be used. The purpose of our system is to use a colour based method to reduce the amount of information that must be process...
متن کاملSecurity and resilience for smart devices and applications
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is widely argued that security has become a primary concern, in order to ensure dependable, secure communications and services to the end user. There are many open questions for these challenging...
متن کاملKurosawa-Desmedt Meets Tight Security
At EUROCRYPT 2016, Gay et al. presented the first pairing-free public-key encryption (PKE) scheme with an almost tight security reduction to a standard assumption. Their scheme is competitive in efficiency with state-of-the art PKE schemes and has very compact ciphertexts (of three group elements), but suffers from a large public key (of about 200 group elements). In this work, we present an im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the IEEE
سال: 2015
ISSN: 0018-9219,1558-2256
DOI: 10.1109/jproc.2014.2387353