Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Dominic Pirker"'
Publikováno v:
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
Information, probably the most valuable good nowadays, is collected by billions of connected devices around the world and beyond. The processing of information is mostly done remotely with respect to the sensed environment. Therefore, it is crucial t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::26af20fe186d5e313068ae3d4ea92aca
https://zenodo.org/record/5846307
https://zenodo.org/record/5846307
Publikováno v:
2021 24th Euromicro Conference on Digital System Design (DSD)
DSD
DSD
The Internet of Things (IoT) is disseminating our daily life and gets ubiquitous not only in industry. With this growth, device and communications security is increasingly important. Hardware Security Modules (HSMs) are integrated into IoT devices to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5c69005f486ad0ff595d1bbd412ae003
Publikováno v:
2020 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom)
UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel scenarios are extending the seemingly endless list of use cases for this emerging technology. To avoid ungoverned proliferation and abandoned aerial
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::547e3506ac115a0faee7718eeec0edae
https://zenodo.org/record/4022181
https://zenodo.org/record/4022181
Publikováno v:
MobileCloud
UAVs are gaining traction outside their usual markets of hobbyists, areal recordings, and surveillance services with cloud computing enabled applications and their massive combined computing power. These applications rapidly grow the UAV market, cons
Publikováno v:
2020 International Conference on Broadband Communications for Next Generation Networks and Multimedia Applications (CoBCom).
To enhance the security of devices in the Internet of Things, devices are augmented with Hardware Security Modules (HSMs). To connect HSMs to their hosting devices, serial interfaces, e.g. I2C, are used. On top of these interfaces, a protocol stack i
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Partitioning security components of IoT devices to enable the use of Trusted Execution Environments adds resilience against side-channel attacks. Devices are hardened against extraction of sensitive information, but at the same time additional effort