Zobrazeno 1 - 10
of 319
pro vyhledávání: '"Embedded security"'
Publikováno v:
IEEE Access, Vol 12, Pp 104414-104428 (2024)
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for
Externí odkaz:
https://doaj.org/article/40e96f5962f642a7b432112c45dc651c
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-18 (2022)
Abstract Fuzzing has become one of the best-established methods to uncover software bugs. Meanwhile, the market of embedded systems, which binds the software execution tightly to the very hardware architecture, has grown at a steady pace, and that pa
Externí odkaz:
https://doaj.org/article/6a057066fbed40eeb4942c6cb04f0d4c
Autor:
Kun Xiao
Publikováno v:
Alexandria Engineering Journal, Vol 60, Iss 5, Pp 4223-4230 (2021)
Internet technology, as a product of the development of the network era, connects a large number of hardware devices, but the connection of many devices makes its corresponding security be greatly tested. The network security technology and the corre
Externí odkaz:
https://doaj.org/article/528180919e0b4771adb01957fa299ae4
Autor:
Kaddami, Oussama
Memory corruption attacks pose a significant threat to the security of embedded devices with limited resources that lack basic protection mechanisms. Control Flow Integrity (CFI) is a promising technique to mitigate these attacks by ensuring that the
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-346242
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Mathematics, Vol 10, Iss 5, p 848 (2022)
IoT is extensively used in many infrastructure applications, including telehealth, smart homes, smart grids, and smart cities. However, IoT has the weakest link in system security since it often has low processing and power resources. It is important
Externí odkaz:
https://doaj.org/article/16c88b99967a4a0a94c993747e54bcd9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Egyptian Journal of Forensic Sciences, Vol 8, Iss 1, Pp 1-10 (2018)
Abstract Background In a field of digital forensic science, we have struggled to prove and keep any evidence in its most original form. The seized source of color laser printers in forgery crimes has been still an awkward issue today in digital foren
Externí odkaz:
https://doaj.org/article/4ba505bd135244fc8135cb80bd488c0e
Publikováno v:
IEEE Access, Vol 6, Pp 9303-9323 (2018)
In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8and 16-bit microcontroller units (MCUs). Previous attempts at implementing crypt
Externí odkaz:
https://doaj.org/article/e4a2ceb83b884c86bf334ae432e5d871