Journal articles on the topic 'Hardware Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hardware Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Polian, Ilia. "Hardware-oriented security." it - Information Technology 61, no. 1 (February 25, 2019): 1–2. http://dx.doi.org/10.1515/itit-2019-0008.
Full textHunter, Philip. "Hardware-based security." Computer Fraud & Security 2004, no. 2 (February 2004): 11–12. http://dx.doi.org/10.1016/s1361-3723(04)00029-6.
Full textSengupta, Anirban. "Hardware Security of CE Devices [Hardware Matters]." IEEE Consumer Electronics Magazine 6, no. 1 (January 2017): 130–33. http://dx.doi.org/10.1109/mce.2016.2614552.
Full textJin, Yier. "Introduction to Hardware Security." Electronics 4, no. 4 (October 13, 2015): 763–84. http://dx.doi.org/10.3390/electronics4040763.
Full textKoushanfar, Farinaz, and Miodrag Potkonjak. "What is hardware security?" ACM SIGDA Newsletter 40, no. 9 (September 2010): 1. http://dx.doi.org/10.1145/1866978.1866979.
Full textFox, Dirk. "Hardware Security Module (HSM)." Datenschutz und Datensicherheit - DuD 33, no. 9 (September 2009): 564. http://dx.doi.org/10.1007/s11623-009-0145-9.
Full textGuin, Ujjwal, Navid Asadizanjani, and Mark Tehranipoor. "Standards for Hardware Security." GetMobile: Mobile Computing and Communications 23, no. 1 (July 24, 2019): 5–9. http://dx.doi.org/10.1145/3351422.3351424.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textAdlkofer, Hans. "Safety and Security Need Hardware." ATZelectronics worldwide 16, no. 10 (October 2021): 66. http://dx.doi.org/10.1007/s38314-021-0699-3.
Full textD.S, Suresh, and V. Udayashankara. "External Hardware Security for Steganography." i-manager's Journal on Future Engineering and Technology 2, no. 2 (January 15, 2007): 17–22. http://dx.doi.org/10.26634/jfet.2.2.874.
Full textKitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (January 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.
Full textLabrado, Carson, and Himanshu Thapliyal. "Hardware Security Primitives for Vehicles." IEEE Consumer Electronics Magazine 8, no. 6 (November 1, 2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Full textPerez, Ronald, Leendert van Doorn, and Reiner Sailer. "Virtualization and Hardware-Based Security." IEEE Security & Privacy Magazine 6, no. 5 (September 2008): 24–31. http://dx.doi.org/10.1109/msp.2008.135.
Full textPang, Yachuan, Bin Gao, Bohan Lin, He Qian, and Huaqiang Wu. "Memristors for Hardware Security Applications." Advanced Electronic Materials 5, no. 9 (April 24, 2019): 1800872. http://dx.doi.org/10.1002/aelm.201800872.
Full textEdwards, Chris. "Automation Key to Hardware Security." New Electronics 55, no. 10 (October 2022): 28–29. http://dx.doi.org/10.12968/s0047-9624(23)60439-0.
Full textZhang, Zhiming, and Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems." Journal of Low Power Electronics and Applications 8, no. 4 (November 27, 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Full textSouren, Joseph. "Security by design: hardware-based security in Windows 8." Computer Fraud & Security 2013, no. 5 (May 2013): 18–20. http://dx.doi.org/10.1016/s1361-3723(13)70046-0.
Full textIKEDA, Makoto. "Secure LSI Design: Solutions to Hardware Security and Hardware Vulnerability." IEICE ESS Fundamentals Review 12, no. 2 (October 1, 2018): 126–32. http://dx.doi.org/10.1587/essfr.12.2_126.
Full textHu, Wei, Armaiti Ardeshiricham, and Ryan Kastner. "Hardware Information Flow Tracking." ACM Computing Surveys 54, no. 4 (May 2021): 1–39. http://dx.doi.org/10.1145/3447867.
Full textGunn, Lachlan J., N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, and Thomas Nyman. "Hardware Platform Security for Mobile Devices." Foundations and Trends® in Privacy and Security 3, no. 3-4 (2022): 214–394. http://dx.doi.org/10.1561/3300000024.
Full textYoshida, Kota, and Takeshi Fujino. "Hardware Security on Edge AI Devices." IEICE ESS Fundamentals Review 15, no. 2 (October 1, 2021): 88–100. http://dx.doi.org/10.1587/essfr.15.2_88.
Full textYang, Kun, Haoting Shen, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. "Hardware-Enabled Pharmaceutical Supply Chain Security." ACM Transactions on Design Automation of Electronic Systems 23, no. 2 (January 24, 2018): 1–26. http://dx.doi.org/10.1145/3144532.
Full textNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGARCH Computer Architecture News 36, no. 1 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353534.1346321.
Full textNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGOPS Operating Systems Review 42, no. 2 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353535.1346321.
Full textNightingale, Edmund B., Daniel Peek, Peter M. Chen, and Jason Flinn. "Parallelizing security checks on commodity hardware." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 308–18. http://dx.doi.org/10.1145/1353536.1346321.
Full textGong, Yanping, Fengyu Qian, and Lei Wang. "Probabilistic Evaluation of Hardware Security Vulnerabilities." ACM Transactions on Design Automation of Electronic Systems 24, no. 2 (March 21, 2019): 1–20. http://dx.doi.org/10.1145/3290405.
Full textGranado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (January 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.
Full textCasinghino, Chris. "A Language for Programmable Hardware Security." ACM SIGAda Ada Letters 39, no. 1 (January 10, 2020): 71. http://dx.doi.org/10.1145/3379106.3379115.
Full textGilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.
Full textStiles, Doug. "The Hardware Security Behind Azure Sphere." IEEE Micro 39, no. 2 (March 1, 2019): 20–28. http://dx.doi.org/10.1109/mm.2019.2898633.
Full textSiriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.
Full textPopat, Jayesh, and Usha Mehta. "Hardware Security in Case of Scan Based Attack on Crypto Hardware." International Journal of VLSI Design & Communication Systems 9, no. 2 (April 30, 2018): 01–10. http://dx.doi.org/10.5121/vlsic.2018.9201.
Full textKalathil Nandalal, Devika, and Ramesh Bhakthavatchalu. "Design of programmable hardware security modules for enhancing blockchain based security framework." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 3178. http://dx.doi.org/10.11591/ijece.v13i3.pp3178-3191.
Full textZhang, Qian, Sujay Charania, Stefan Rothe, Nektarios Koukourakis, Niels Neumann, Dirk Plettemeier, and Juergen W. Czarske. "Multimode Optical Interconnects on Silicon Interposer Enable Confidential Hardware-to-Hardware Communication." Sensors 23, no. 13 (July 1, 2023): 6076. http://dx.doi.org/10.3390/s23136076.
Full textHenkel, Jorg. "Top Picks in Hardware and Embedded Security." IEEE Design & Test 38, no. 3 (June 2021): 4. http://dx.doi.org/10.1109/mdat.2021.3077859.
Full textTanjidur Rahman, M., and Navid Asadizanjani. "Failure Analysis for Hardware Assurance and Security." EDFA Technical Articles 21, no. 3 (August 1, 2019): 16–24. http://dx.doi.org/10.31399/asm.edfa.2019-3.p016.
Full textLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (December 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.
Full textMathew, Jimson, Rajat Subhra Chakraborty, Durga Prasad Sahoo, Yuanfan Yang, and Dhiraj K. Pradhan. "A Novel Memristor-Based Hardware Security Primitive." ACM Transactions on Embedded Computing Systems 14, no. 3 (May 21, 2015): 1–20. http://dx.doi.org/10.1145/2736285.
Full textStitt, Greg, Robert Karam, Kai Yang, and Swarup Bhunia. "A Uniquified Virtualization Approach to Hardware Security." IEEE Embedded Systems Letters 9, no. 3 (September 2017): 53–56. http://dx.doi.org/10.1109/les.2017.2679183.
Full textLotz, V., V. Kessler, and G. H. Walter. "A formal security model for microprocessor hardware." IEEE Transactions on Software Engineering 26, no. 8 (2000): 702–12. http://dx.doi.org/10.1109/32.879809.
Full textJäppinen, Pekka, and Mikko Lampi. "Hardware Cost Measurement of Lightweight Security Protocols." Wireless Personal Communications 71, no. 2 (October 20, 2012): 1479–86. http://dx.doi.org/10.1007/s11277-012-0886-x.
Full textLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." ATZelektronik worldwide 10, no. 3 (May 30, 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.
Full textMannan, Mohammad, and N. Asokan. "Confronting the Limitations of Hardware-Assisted Security." IEEE Security & Privacy 18, no. 5 (September 2020): 6–7. http://dx.doi.org/10.1109/msec.2020.3015413.
Full textHuffmire, Ted, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Brett Brotherton, Gang Wang, Timothy Sherwood, and Ryan Kastner. "Security Primitives for Reconfigurable Hardware-Based Systems." ACM Transactions on Reconfigurable Technology and Systems 3, no. 2 (May 2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Full textSmith, S. "Magic boxes and boots: security in hardware." Computer 37, no. 10 (October 2004): 106–9. http://dx.doi.org/10.1109/mc.2004.170.
Full textZic, John J., Martin de Groot, Dongxi Liu, Julian Jang, and Chen Wang. "Hardware Security Device Facilitated Trusted Energy Services." Mobile Networks and Applications 17, no. 4 (March 14, 2012): 564–77. http://dx.doi.org/10.1007/s11036-012-0363-5.
Full textKitsos, P., N. Sklavos, and O. Koufopavlou. "UMTS security: system architecture and hardware implementation." Wireless Communications and Mobile Computing 7, no. 4 (2007): 483–94. http://dx.doi.org/10.1002/wcm.367.
Full textKumar, Niraj, Vishnu Mohan Mishra, and Adesh Kumar. "Smart grid security with AES hardware chip." International Journal of Information Technology 12, no. 1 (April 11, 2018): 49–55. http://dx.doi.org/10.1007/s41870-018-0123-2.
Full textJohn, Lizy Kurian. "Hardware Security and Privacy: Threats and Opportunities." IEEE Micro 43, no. 5 (September 2023): 4–5. http://dx.doi.org/10.1109/mm.2023.3304091.
Full textBarua, Anomadarshi, and Mohammad Abdullah Al Faruque. "Hardware/Software Co-Design for Sensor Security." Computer 56, no. 5 (May 2023): 122–25. http://dx.doi.org/10.1109/mc.2023.3248779.
Full text