Artículos de revistas sobre el tema "Hardware Security Primitives"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hardware Security Primitives".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Labrado, Carson y Himanshu Thapliyal. "Hardware Security Primitives for Vehicles". IEEE Consumer Electronics Magazine 8, n.º 6 (1 de noviembre de 2019): 99–103. http://dx.doi.org/10.1109/mce.2019.2941392.
Texto completoHuffmire, Ted, Timothy Levin, Thuy Nguyen, Cynthia Irvine, Brett Brotherton, Gang Wang, Timothy Sherwood y Ryan Kastner. "Security Primitives for Reconfigurable Hardware-Based Systems". ACM Transactions on Reconfigurable Technology and Systems 3, n.º 2 (mayo de 2010): 1–35. http://dx.doi.org/10.1145/1754386.1754391.
Texto completoGordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian y Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions". Cryptography 5, n.º 1 (4 de febrero de 2021): 7. http://dx.doi.org/10.3390/cryptography5010007.
Texto completoZhang, Zhiming y Qiaoyan Yu. "Towards Energy-Efficient and Secure Computing Systems". Journal of Low Power Electronics and Applications 8, n.º 4 (27 de noviembre de 2018): 48. http://dx.doi.org/10.3390/jlpea8040048.
Texto completoBi, Yu, Kaveh Shamsi, Jiann-Shiun Yuan, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Xunzhao Yin, X. Sharon Hu, Michael Niemier y Yier Jin. "Emerging Technology-Based Design of Primitives for Hardware Security". ACM Journal on Emerging Technologies in Computing Systems 13, n.º 1 (6 de diciembre de 2016): 1–19. http://dx.doi.org/10.1145/2816818.
Texto completoDubrova, Elena. "Energy-efficient cryptographic primitives". Facta universitatis - series: Electronics and Energetics 31, n.º 2 (2018): 157–67. http://dx.doi.org/10.2298/fuee1802157d.
Texto completoVenkataraman, Anusha, Eberechukwu Amadi y Chris Papadopoulos. "Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks". Micro 2, n.º 3 (21 de junio de 2022): 361–68. http://dx.doi.org/10.3390/micro2030024.
Texto completoTsantikidou, Kyriaki y Nicolas Sklavos. "Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare". Cryptography 6, n.º 3 (1 de septiembre de 2022): 45. http://dx.doi.org/10.3390/cryptography6030045.
Texto completoTomecek, Jozef. "Hardware optimizations of stream cipher rabbit". Tatra Mountains Mathematical Publications 50, n.º 1 (1 de diciembre de 2011): 87–101. http://dx.doi.org/10.2478/v10127-011-0039-8.
Texto completoPreetisudha Meher, Lukram Dhanachandra Singh,. "Advancing Hardware Security: A Review and Novel Design of Configurable Arbiter PUF with DCM-Induced Metastability for Enhanced Resource Efficiency and Unpredictability". Tuijin Jishu/Journal of Propulsion Technology 45, n.º 01 (16 de febrero de 2024): 3804–16. http://dx.doi.org/10.52783/tjjpt.v45.i01.4934.
Texto completoChakraborty, Suvradip, Janaka Alawatugoda y Chandrasekaran Pandu Rangan. "New approach to practical leakage-resilient public-key cryptography". Journal of Mathematical Cryptology 14, n.º 1 (11 de julio de 2020): 172–201. http://dx.doi.org/10.1515/jmc-2019-0014.
Texto completoAmsaad, Fathi, Mohammed Niamat, Amer Dawoud y Selcuk Kose. "Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks". Information 9, n.º 9 (3 de septiembre de 2018): 224. http://dx.doi.org/10.3390/info9090224.
Texto completoEl Hadj Youssef, Wajih, Ali Abdelli, Fethi Dridi y Mohsen Machhout. "Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications". Security and Communication Networks 2020 (29 de noviembre de 2020): 1–13. http://dx.doi.org/10.1155/2020/8860598.
Texto completoBathalapalli, Venkata K. V. V., Saraju P. Mohanty, Elias Kougianos, Vasanth Iyer y Bibhudutta Rout. "PUFchain 3.0: Hardware-Assisted Distributed Ledger for Robust Authentication in Healthcare Cyber–Physical Systems". Sensors 24, n.º 3 (31 de enero de 2024): 938. http://dx.doi.org/10.3390/s24030938.
Texto completoLara-Nino, Carlos Andres, Arturo Diaz-Perez y Miguel Morales-Sandoval. "Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN". Security and Communication Networks 2018 (4 de septiembre de 2018): 1–14. http://dx.doi.org/10.1155/2018/5087065.
Texto completoRussinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy". Queue 21, n.º 4 (31 de agosto de 2023): 44–48. http://dx.doi.org/10.1145/3623461.
Texto completoChung, Kai-Min, Marios Georgiou, Ching-Yi Lai y Vassilis Zikas. "Cryptography with Disposable Backdoors". Cryptography 3, n.º 3 (20 de agosto de 2019): 22. http://dx.doi.org/10.3390/cryptography3030022.
Texto completoAl-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane y Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT". Sensors 20, n.º 7 (31 de marzo de 2020): 1963. http://dx.doi.org/10.3390/s20071963.
Texto completoNili, Hussein, Gina C. Adam, Brian Hoskins, Mirko Prezioso, Jeeson Kim, M. Reza Mahmoodi, Farnood Merrikh Bayat, Omid Kavehei y Dmitri B. Strukov. "Hardware-intrinsic security primitives enabled by analogue state and nonlinear conductance variations in integrated memristors". Nature Electronics 1, n.º 3 (marzo de 2018): 197–202. http://dx.doi.org/10.1038/s41928-018-0039-7.
Texto completoGómez-Marín, Ernesto, Valerio Senni, Luis Parrilla, Jose L. Tejero López, Encarnación Castillo y Davide Martintoni. "An Innovative Strategy Based on Secure Element for Cyber–Physical Authentication in Safety-Critical Manufacturing Supply Chain". Applied Sciences 13, n.º 18 (19 de septiembre de 2023): 10477. http://dx.doi.org/10.3390/app131810477.
Texto completoBoovaraghavan, Sudershan, Chen Chen, Anurag Maravi, Mike Czapik, Yang Zhang, Chris Harrison y Yuvraj Agarwal. "Mites". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, n.º 1 (27 de marzo de 2022): 1–32. http://dx.doi.org/10.1145/3580865.
Texto completoZhu, Lianghong, Huaikun Xiang y Kai Zhang. "A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks". Symmetry 14, n.º 1 (30 de diciembre de 2021): 46. http://dx.doi.org/10.3390/sym14010046.
Texto completoKorona, Mateusz, Radosław Giermakowski, Mateusz Biernacki y Mariusz Rawski. "Lightweight Strong PUF for Resource-Constrained Devices". Electronics 13, n.º 2 (14 de enero de 2024): 351. http://dx.doi.org/10.3390/electronics13020351.
Texto completoAsif, Rameez, Kinan Ghanem y James Irvine. "Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy". Sensors 21, n.º 1 (23 de diciembre de 2020): 28. http://dx.doi.org/10.3390/s21010028.
Texto completoChen, Xue Dong y Bao Peng. "A Security Localization Method in Wireless Sensor Networks". Advanced Materials Research 186 (enero de 2011): 193–97. http://dx.doi.org/10.4028/www.scientific.net/amr.186.193.
Texto completoBernard, Florent, Viktor Fischer y Boyan Valtchanov. "Mathematical model of physical RNGs based on coherent sampling". Tatra Mountains Mathematical Publications 45, n.º 1 (1 de diciembre de 2010): 1–14. http://dx.doi.org/10.2478/v10127-010-0001-1.
Texto completoHardin, David. "Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development". ACM SIGAda Ada Letters 42, n.º 2 (5 de abril de 2023): 55–61. http://dx.doi.org/10.1145/3591335.3591340.
Texto completoNoseda, Mario, Lea Zimmerli, Tobias Schläpfer y Andreas Rüst. "Performance Analysis of Secure Elements for IoT". IoT 3, n.º 1 (21 de diciembre de 2021): 1–28. http://dx.doi.org/10.3390/iot3010001.
Texto completoScholz, Alexander, Lukas Zimmermann, Axel Sikora, Mehdi B. Tahoori y Jasmin Aghassi-Hagmann. "Embedded Analog Physical Unclonable Function System to Extract Reliable and Unique Security Keys". Applied Sciences 10, n.º 3 (21 de enero de 2020): 759. http://dx.doi.org/10.3390/app10030759.
Texto completoUpadhyaya, Devanshi, Maël Gay y Ilia Polian. "Locking-Enabled Security Analysis of Cryptographic Circuits". Cryptography 8, n.º 1 (5 de enero de 2024): 2. http://dx.doi.org/10.3390/cryptography8010002.
Texto completoSerrano, Ronaldo, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham y Trong-Thuc Hoang. "ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3". Cryptography 6, n.º 2 (17 de junio de 2022): 30. http://dx.doi.org/10.3390/cryptography6020030.
Texto completoMadushan, Hasindu, Iftekhar Salam y Janaka Alawatugoda. "A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses". Electronics 11, n.º 24 (15 de diciembre de 2022): 4199. http://dx.doi.org/10.3390/electronics11244199.
Texto completoMaolood, Abeer Tariq, Alaa Kadhim Farhan, Wageda I. El-Sobky, Hany Nasry Zaky, Hossam L. Zayed, Hossam E. Ahmed y Tamer O. Diab. "Fast Novel Efficient S-Boxes with Expanded DNA Codes". Security and Communication Networks 2023 (18 de abril de 2023): 1–19. http://dx.doi.org/10.1155/2023/5767102.
Texto completoMartin, Honorio, Pedro Martin-Holgado, Yolanda Morilla, Luis Entrena y Enrique San-Millan. "Total Ionizing Dose Effects on a Delay-Based Physical Unclonable Function Implemented in FPGAs". Electronics 7, n.º 9 (24 de agosto de 2018): 163. http://dx.doi.org/10.3390/electronics7090163.
Texto completoChattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew y Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability". ACM Transactions on Design Automation of Electronic Systems 26, n.º 6 (30 de noviembre de 2021): 1–24. http://dx.doi.org/10.1145/3460004.
Texto completoAlkanhal, Mona, Abdulaziz Alali y Mohamed Younis. "A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV". IoT 5, n.º 1 (30 de diciembre de 2023): 1–19. http://dx.doi.org/10.3390/iot5010001.
Texto completoZhou, Zhen, Debiao He, Zhe Liu, Min Luo y Kim-Kwang Raymond Choo. "A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme". ACM Transactions on Reconfigurable Technology and Systems 14, n.º 2 (5 de junio de 2021): 1–21. http://dx.doi.org/10.1145/3447812.
Texto completoIbrahim, Atef y Fayez Gebali. "Energy-Efficient Word-Serial Processor for Field Multiplication and Squaring Suitable for Lightweight Authentication Schemes in RFID-Based IoT Applications". Applied Sciences 11, n.º 15 (28 de julio de 2021): 6938. http://dx.doi.org/10.3390/app11156938.
Texto completoRojas-Muñoz, Luis F., Santiago Sánchez-Solano, Macarena C. Martínez-Rodríguez y Piedad Brox. "On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices". Sensors 23, n.º 8 (18 de abril de 2023): 4070. http://dx.doi.org/10.3390/s23084070.
Texto completoKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas y Karan Rawat. "PUF-based user access control scheme for IoT environment". Journal of Information and Optimization Sciences 44, n.º 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Texto completoEllinidou, Soultana, Gaurav Sharma, Théo Rigas, Tristan Vanspouwen, Olivier Markowitch y Jean-Michel Dricot. "SSPSoC: A Secure SDN-Based Protocol over MPSoC". Security and Communication Networks 2019 (18 de marzo de 2019): 1–11. http://dx.doi.org/10.1155/2019/4869167.
Texto completoFrank, Florian, Simon Böttger, Nico Mexis, Nikolaos Athanasios Anagnostopoulos, Ali Mohamed, Martin Hartmann, Harald Kuhn et al. "CNT-PUFs: Highly Robust and Heat-Tolerant Carbon-Nanotube-Based Physical Unclonable Functions". Nanomaterials 13, n.º 22 (11 de noviembre de 2023): 2930. http://dx.doi.org/10.3390/nano13222930.
Texto completoSánchez-Solano, Santiago, Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez y Piedad Brox. "Multi-Unit Serial Polynomial Multiplier to Accelerate NTRU-Based Cryptographic Schemes in IoT Embedded Systems". Sensors 22, n.º 5 (7 de marzo de 2022): 2057. http://dx.doi.org/10.3390/s22052057.
Texto completoI Mhaibes, Hakeem y Shahnawaz Qadir. "A Lightweight Authentication Framework for Wireless Sensor Networks". International journal of electrical and computer engineering systems 13, n.º 13 (3 de febrero de 2022): 19–27. http://dx.doi.org/10.32985/ijeces.13.1.3.
Texto completoRao, Muzaffar, Thomas Newe, Ian Grout y Avijit Mathur. "High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs". Journal of Circuits, Systems and Computers 25, n.º 07 (22 de abril de 2016): 1650069. http://dx.doi.org/10.1142/s0218126616500699.
Texto completoKurra, Anil Kumar y Usha Rani Nelakuditi. "A Reliable Current Starved Inverter based Arbiter Puf Architecture for Iot Applications". International Journal of Engineering and Advanced Technology 9, n.º 1s5 (30 de diciembre de 2019): 163–67. http://dx.doi.org/10.35940/ijeat.a1038.1291s519.
Texto completoFalas, Solon, Charalambos Konstantinou y Maria K. Michael. "A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems". ACM Journal on Emerging Technologies in Computing Systems 18, n.º 1 (31 de enero de 2022): 1–19. http://dx.doi.org/10.1145/3460234.
Texto completoUeno, Rei, Naofumi Homma, Akiko Inoue y Kazuhiko Minematsu. "Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de diciembre de 2023): 264–308. http://dx.doi.org/10.46586/tches.v2024.i1.264-308.
Texto completoBanerjee, Soumya, Ashok Kumar Das, Samiran Chattopadhyay, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues y Youngho Park. "Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment". Electronics 10, n.º 12 (12 de junio de 2021): 1417. http://dx.doi.org/10.3390/electronics10121417.
Texto completoIbrahim, Atef y Fayez Gebali. "Word-Based Systolic Processor for Field Multiplication and Squaring Suitable for Cryptographic Processors in Resource-Constrained IoT Systems". Electronics 10, n.º 15 (25 de julio de 2021): 1777. http://dx.doi.org/10.3390/electronics10151777.
Texto completo