نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
Research into defense mechanisms for digital information has intensified in recent years, as malicious attacks on software systems have become a rapidly growing burden. The growing area of software protection attempts to address the problems of code understanding and code tampering along with related problems such as authorization. Our work focuses on the design and evaluation of an architectur...
Security continues to be an increasingly important concern in the design of modern systems. Many systems may have security requirements such as protecting the integrity and confidentiality of data and code stored in the system, ensuring integrity of computations, or preventing the execution of unauthorized code. Making security guarantees has become even harder with the emergence of hardware at...
Existing techniques for IP address autoconfiguration in mobile ad hoc networks (MANETs) do not address security issues. In this paper, we first describe some of the existing IP address autoconfiguration schemes, and discuss their security shortcomings. We then provide solutions to these security issues based on the use of trust models. A specific trust model is also proposed for use in improvin...
the convention on the prevention and punishment of the crime of genocide was adopted by the un general assembly in december 1948. in former yugoslavia and rwanda occurred many heinous crimes and majority ruling powers tried to destroy molem and totsi minority groups. the un security council established the international criminal tribunal for the former yugoslavia (icty) and rwanda (ictr). the u...
This article presents a detailed discussion of various aspects of watermarking technologies on applications ranging from the embedding of marks in the pictorial information on paper, to hardware protection. Included in the present discussion are the general concepts, motivation for watermarking, analog versus digital watermarking, various applications of watermarking such as paper marks, curren...
The Internet of Things (IoT) is emerging as an attractive paradigm, and several IoT models and related security issues have received widespread attentions. In this paper, we focus on an existing U2IoT architecture (i.e., Unit IoT and Ubiquitous IoT), and propose a directed path based authentication scheme (DPAS) to realize security protection for the U2IoT architecture. Particularly, the direct...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید