نتایج جستجو برای: hardware security
تعداد نتایج: 279905 فیلتر نتایج به سال:
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
An embedded system is a combination of hardware and software designed to perform specific functions. It consists SoCs (system on chip) that it relies do its computing work. A key feature an consumes less power components occupy space the IC (integrated circuit) thus, use SoCs. Embedded manufacturers get these from third-party companies reduce their time market. That would increase possibility s...
Sensor networks and IoT systems have been widely deployed in monitoring controlling system. With its increasing utilization, the functionality performance of sensor their applications are not only design aims; security issues attract more attentions. Security threats could be originated from various sectors: users cyber space, security-weak protocols, obsolete network infrastructure, low-end ph...
The idea to publish a special issue on hardware and embedded security stems from workshop with the same name where previously published conference journal papers were presented. here present extended adjusted versions of these works fit under this common umbrella. My thanks goes Prof. Ramesh Karri NYU who had discussed me back in 2019. Thanks his continued efforts ideas, became reality. I also ...
چکیده ندارد.
This paper presents the design procedure and implementation results of a proposed hardware which performs different satellite Image compressions using FPGA Xilinx board. First, the method is described and then VHDL code is written and synthesized by ISE software of Xilinx Company. The results show that it is easy and useful to design, develop and implement the hardware image compressor using ne...
Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...
Modern electronic devices expose themselves to danger from adversaries who try to extract secrete information. Security has become a major issue in the embedded system since several years. Even though the devices are protected by modern cryptographic algorithms, such as AES or RSA, the security is limited. Specially, hardware attack like differential power analysis (DPA) is very powerful method...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید