Zobrazeno 1 - 10
of 123
pro vyhledávání: '"Nele Mentens"'
Publikováno v:
IEEE Access, Vol 9, Pp 63995-64015 (2021)
Network Intrusion detection systems are essential for the protection of advanced communication networks. Originally, these systems were hard-coded to identify specific signatures, patterns and rule violations; now artificial intelligence and machine
Externí odkaz:
https://doaj.org/article/9ef1b9f8c511423d93e4e46f37c9cb8b
Publikováno v:
IEEE Access, Vol 9, Pp 67466-67476 (2021)
In order to reduce the workload of hospital staff and to provide better services to hospitalized patients, attempts are made to integrate patient monitoring systems directly into hospital networks. Monitoring systems must respond to more and more tec
Externí odkaz:
https://doaj.org/article/c82bc5603567485ea1b1a7818d218d00
Autor:
Nele Mentens, Jan Genoe, Thomas Vandenabeele, Lynn Verschueren, Dirk Smets, Wim Dehaene, Kris Myny
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 4 (2019)
Electronic devices on plastic foil, also referred to as flexible electronics, are making their way into mainstream applications. In the near future, flexible electronic labels can be embedded in smart blisters, but also used as mainstream technology
Externí odkaz:
https://doaj.org/article/6e0138cb99d742a1ae71c3975f69809a
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
In this paper we present a novel true random number generator based on high-precision edge sampling. We use two novel techniques to increase the throughput and reduce the area of the proposed randomness source: variable-precision phase encoding and r
Externí odkaz:
https://doaj.org/article/790de9481fb84c84807085b9d6a5bc26
Publikováno v:
Journal of Low Power Electronics and Applications, Vol 7, Iss 1, p 3 (2017)
This work implements and evaluates the recent complete addition formulae for the prime order elliptic curves of Renes, Costello and Batina on an FPGA platform. We implement three different versions:(1) an unprotected architecture; (2) an architecture
Externí odkaz:
https://doaj.org/article/a1e1d656f7614f3698e6de67870109d5
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security approaches to verify the reliability of IoT devices. To this end, Remote Attestation (RA) serves as a key mechanism that remotely detects the presence of m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ad62f051117629d8f85e0179b01dbc36
https://hdl.handle.net/20.500.14017/54c6e8cd-9a61-431a-9328-c66b003f2290
https://hdl.handle.net/20.500.14017/54c6e8cd-9a61-431a-9328-c66b003f2290
Publikováno v:
IEEE Security & Privacy. 21:6-7
Publikováno v:
Applications of Evolutionary Computation ISBN: 9783031302282
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::392fd7b837d322f7c68e3b3ac9b380b0
https://doi.org/10.1007/978-3-031-30229-9_20
https://doi.org/10.1007/978-3-031-30229-9_20
Autor:
Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, Ahmad‐Reza Sadeghi
Publikováno v:
Security and Privacy in the Internet of Things. :1-30
Publikováno v:
Journal of Cryptographic Engineering. SPRINGER HEIDELBERG
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering
Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have to