Gotowa bibliografia na temat „Secure device enrollment”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secure device enrollment”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Secure device enrollment"
Ali-Pour, Amir, David Hely, Vincent Beroulle i Giorgio Di Natale. "Strong PUF Enrollment with Machine Learning: A Methodical Approach". Electronics 11, nr 4 (19.02.2022): 653. http://dx.doi.org/10.3390/electronics11040653.
Pełny tekst źródłaGómez-Marín, Ernesto, Luis Parrilla, Gianfranco Mauro, Antonio Escobar-Molero, Diego P. Morales i Encarnación Castillo. "RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation". Sensors 22, nr 13 (5.07.2022): 5060. http://dx.doi.org/10.3390/s22135060.
Pełny tekst źródłaLalitha, V., i J. K. Periasamy. "Mobile based secured student online exam system". International Journal of Engineering & Technology 7, nr 1.7 (5.02.2018): 118. http://dx.doi.org/10.14419/ijet.v7i1.7.9588.
Pełny tekst źródłaO’Brien, Daniel F., Lilah Fones, Victoria Stoj, Cory Edgar, Katherine Coyner i Robert A. Arciero. "Confirming Proper Button Deployment of Suspensory Fixation During ACL Reconstruction". Orthopaedic Journal of Sports Medicine 9, nr 1 (1.01.2021): 232596712097434. http://dx.doi.org/10.1177/2325967120974349.
Pełny tekst źródłaSoumpasis, Ilias, Samer Nashef, Joel Dunning, Paul Moran i Mark Slack. "Safe implementation of surgical innovation: a prospective registry of the Versius Robotic Surgical System". BMJ Surgery, Interventions, & Health Technologies 5, nr 1 (luty 2023): e000144. http://dx.doi.org/10.1136/bmjsit-2022-000144.
Pełny tekst źródłaOldenburg, Johannes, María Teresa Alvarez Román, Giancarlo Castaman, Maissaa Janbain, Tadashi Matsushita, Karina Meijer, Sabine Friedl, Martin Sanabria i Mark Reding. "Real-World Effectiveness and Safety of BAY 94-9027 (Damoctocog Alfa Pegol) in Previously Treated Patients with Hemophilia A (HEM-POWR): Online Patient Portal and LIFE-ACTIVE Sub-Study". Blood 134, Supplement_1 (13.11.2019): 4943. http://dx.doi.org/10.1182/blood-2019-128140.
Pełny tekst źródłaChen, Yanjiao, Meng Xue, Jian Zhang, Qianyun Guan, Zhiyuan Wang, Qian Zhang i Wei Wang. "ChestLive". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, nr 4 (27.12.2021): 1–25. http://dx.doi.org/10.1145/3494962.
Pełny tekst źródłaOffodile, Anaeze C., Sandra R. DiBrito, Janice P. Finder, Sanjay Shete, Sanchita Jain, Domenica A. Delgado, Christopher J. Miller, Elenita Davidson, Michael J. Overman i Susan K. Peterson. "Active surveillance of chemotherapy-related symptom burden in ambulatory cancer patients via the implementation of electronic patient-reported outcomes and sensor-enabled vital signs capture: protocol for a decentralised feasibility pilot study". BMJ Open 12, nr 4 (kwiecień 2022): e057693. http://dx.doi.org/10.1136/bmjopen-2021-057693.
Pełny tekst źródłaMunoz, Tomas, Palakkumar Patel, Shilpa Viswanath i Bharati Prasad. "657 Patient Perspectives on Telesleep Care in COVID Times: An Urban Teaching Hospital Survey". Sleep 44, Supplement_2 (1.05.2021): A257. http://dx.doi.org/10.1093/sleep/zsab072.655.
Pełny tekst źródłaFraiwan, Arwa, Muhammad Noman Hasan, Ran An, Amy J. Rezac, Nicholas J. Kocmich, Tolulope Oginni, Grace Mfon Olanipekun i in. "Advancing Healthcare Outcomes for Sickle Cell Disease in Nigeria Using Mobile Health Tools". Blood 134, Supplement_1 (13.11.2019): 2173. http://dx.doi.org/10.1182/blood-2019-131344.
Pełny tekst źródłaRozprawy doktorskie na temat "Secure device enrollment"
Khalfaoui, Sameh. "Security bootstrapping for Internet of Things". Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT023.
Pełny tekst źródłaThe demand for internet of Things (IoT) services is increasing exponentially, and a large number of devices are being deployed. However, these devices can represent a serious threat to the security of the deployment network and a potential entry-point when exploited by the adversaries. Thus, there is an imminent need to perform a secure association approach of the IoT objects before being rendered operational on the network of the user. This procedure is referred to as secure bootstrapping, and it primarily guarantees the confidentiality and the integrity of the data exchanges between the user and the devices. Secondly, this process provides an assurance on the identity and the origin of these objects.Due to scalability limitations, the first phase of the bootstrapping process cannot be efficiently conducted using pre-shared security knowledge such as digital certificates. This step is referred to as secure device pairing, and it ensures the establishment of a secure communication channel between the use and the object. The pairing phase uses a symmetric key agreement protocol that is suitable to the resource-constrained nature of these devices. The use of auxiliary channels has been proposed as a way to authenticate the key exchange, but they require a relatively long time and an extensive user involvement to transfer the authentication bits. However, the context-based schemes use the ambient environment to extract a common secret without an extensive user intervention under the requirement of having a secure perimeter during the extraction phase, which is considered a strong security assumption. The second phase of the bootstrapping process is referred to as secure device enrollment, and it aims at avoiding the associating of a malicious IoT object by authenticating its identity. The use of hardware security elements, such as the Physical Unclonable Function (PUF), has been introduced as a promising solution that is suitable for the resource-constraint nature of these devices. A growing number of PUF architectures has been demonstrated mathematically clonable through Machine Learning (ML) modeling techniques. The use of PUF ML models has been recently proposed to authenticate the IoT objects. Nonetheless, the leakage scenario of the PUF model to an adversary due to an insider threat within the organization is not supported by the existing solutions. Hence, the security of these PUF model-based enrollment proposals can be compromised.In this thesis, we study the secure bootstrapping process of resource-constrained devices and we introduce two security schemes:- A hybrid ad-hoc pairing protocol, called COOB, that efficiently combines a state-of-the-art fast context-based scheme with the use of an auxiliary channel. This protocol exploits a nonce exponentiation of the Diffie-Hellman public keys to achieve the temporary secrecy goal needed for the key agreement. Our method provides security even against an attacker that can violate the safe zone requirement, which is not supported by the existing contextual schemes. This security improvement has been formally validated in the symbolic model using the TAMARIN prover.- An enrollment solution that exploits a ML PUF model in the authentication process, called Water-PUF. Our enrollment scheme is based on a specifically designed black-box watermarking technique for PUF models with a binary output response. This procedure prevents an adversary from relying on the watermarked model in question or another derivative model to bypass the authentication. Therefore, any leakage of the watermarked PUF model that is used for the enrollment does not affect the correctness of the protocol. The Water-PUF design is validated by a number of simulations against numerous watermark suppression attacks to assess the robustness of our proposal
Streszczenia konferencji na temat "Secure device enrollment"
Mini, TT. "Secure Device Identifiers and Device Enrollment in Industrial Control System". W 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2019. http://dx.doi.org/10.1109/ants47819.2019.9118131.
Pełny tekst źródła