Zobrazeno 1 - 10
of 350
pro vyhledávání: '"Chain of trust"'
Publikováno v:
Syrian Journal for Science and Innovation, Vol 2, Iss 1 (2024)
Due to the sanctions imposed on Syria on an ongoing basis, the most recent of which is the “Caesar Act,” which has affected Syria in general and in particular the information sector, and whose effects included the ban on the use of digital certif
Externí odkaz:
https://doaj.org/article/157b3e304626429a9a654479ef73c8e6
Publikováno v:
Dianzi Jishu Yingyong, Vol 44, Iss 9, Pp 34-38 (2018)
Physical Unclonable Functions(PUFs) are highly flexible in applications such as device authentication and secure key storage, and are widely used in embedded system security. In this paper, we use PUF technology to provide the root of trust(RoT) for
Externí odkaz:
https://doaj.org/article/9fa4e34a1e69443a8c2dfdca40e4e3c7
Autor:
ABHINAV BHANDARI, ASHOK KUMAR BATHLA
One of the most serious security threats to network domains is a distributed denial of service attack. Various mitigation mechanisms are widely deployed in various networks or domains, but they lack the resources and resilience to deal with DDoS atta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4c344d146dbf3feae94e0c6d556ba60
Publikováno v:
Cardiac Electrophysiology Clinics. 13:499-508
The ability to remotely reprogram a cardiac implantable electronic device (CIED) and the ability to remotely install software or firmware updates would reduce the need for in-office visits and could provide a mechanism to rapidly deploy important sof
Publikováno v:
IEEE Transactions on Network Science and Engineering. 8:1698-1710
Nowadays, existing public key infrastructures (PKIs) certificate authentication suffers from many security failures. Trusted certificate authorities (CAs) can issue a valid certificate for any domain name. Although CA is supposed to be trusted by a c
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Services Computing. 13:30-43
Traditional assurance solutions for software-based systems rely on static verification techniques and assume continuous availability of trusted third parties. With the advent of cloud computing, these solutions become ineffective since services/appli
Publikováno v:
IEEE Access, Vol 8, Pp 13640-13650 (2020)
The inseparable internet requirements and the endless stream of cyber-attacks have led to strong demand for trusted IP addresses. However, the existing collaborative DNS security schemes have the defects of low credibility and imperfect incentive mec
Autor:
Rana Muhammad Qasim, Dr. Masood Hassan
This quantitative study aims to identify the impact of logistic collaboration on supply chain performance. For this purpose, the influence of the characteristics involving trust, organizational commitment, interdependence of supply chain, involvement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::445d4b126b3cdae5e8f25ef031231144