Simple hardware method of data protection
نویسنده
چکیده
A rapid development of the antivirus and antispy software makes us realize how the threat of unauthorized exploring of computer data has been increasing in the recent few years. It is evident, that new generation of spyware has the ability to penetrate computer data through a network. The author suggests that untypical structure of hardware can improve security of data. In this paper the idea of hardware protection of data and additional hardware components: switches of the hard disk and the network card are described.
منابع مشابه
Distance protection closed-loop testing using RTDS
This paper presents a distance protection test procedure by applying the Real-Time Digital Simulator (RTDS) of a power system. RTDS is a tool to design, develop, and test power-system protection. The RTDS enables real-time computation of electromagnetic phenomena with a calculation time step of even 50μs. The hardware allows the import and export of many signals from the simulator to an ext...
متن کاملModel Based Design approach for Implementation of PHEV Energy Management
Hardware implementation of the Plug-in hybrid electric vehicles (PHEVs) control strategy is an important stage of the development of the vehicle electric control unit (ECU). This paper introduces Model-Based Design (MBD) approach for implementation of PHEV energy management. Based on this approach, implementation of the control algorithm on an electronic hardware is performed using automatic co...
متن کاملA low-complexity error-resilient H.263 coder
We propose a low-complexity error resilience method which is compatible with the emerging H.263 standard. The proposed method, which corrects one slice of lost information exactly or partially, is speci cally suited to the packet networks such as internet where the majority of the errors are due to packet losses. The proposed method is simple and to decode the overhead information no extra soft...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملFixed-point FPGA Implementation of a Kalman Filter for Range and Velocity Estimation of Moving Targets
Tracking filters are extensively used within object tracking systems in order to provide consecutive smooth estimations of position and velocity of the object with minimum error. Namely, Kalman filter and its numerous variants are widely known as simple yet effective linear tracking filters in many diverse applications. In this paper, an effective method is proposed for designing and implementa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Annales UMCS, Informatica
دوره 2 شماره
صفحات -
تاریخ انتشار 2004