Добірка наукової літератури з теми "Software and hardware security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software and hardware security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software and hardware security"
Gilmont, T., J. D. Legat, and J. J. Quisquater. "Hardware security for software privacy support." Electronics Letters 35, no. 24 (1999): 2096. http://dx.doi.org/10.1049/el:19991424.
Повний текст джерелаLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." Auto Tech Review 4, no. 12 (December 2015): 24–27. http://dx.doi.org/10.1365/s40112-015-1050-2.
Повний текст джерелаLamparth, Oliver, and Frank Bähren. "Hardware and Software Security in Infotainment Systems." ATZelektronik worldwide 10, no. 3 (May 30, 2015): 34–37. http://dx.doi.org/10.1007/s38314-015-0522-0.
Повний текст джерелаSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Повний текст джерелаMACHER*, Georg, Harald SPORER, Eugen BRENNER, and Christian KREINER. "Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition." Journal of Ubiquitous Systems and Pervasive Networks 10, no. 1 (March 7, 2018): 1–9. http://dx.doi.org/10.5383/juspn.10.01.001.
Повний текст джерелаGranado-Criado, José M., Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, and Juan A. Gómez-Pulido. "Hardware security platform for multicast communications." Journal of Systems Architecture 60, no. 1 (January 2014): 11–21. http://dx.doi.org/10.1016/j.sysarc.2013.11.007.
Повний текст джерелаKonikiewicz, Wojciech, and Marcin Markowski. "Analysis of Performance and Efficiency of Hardware and Software Firewalls." Journal of Applied Computer Science Methods 9, no. 1 (June 1, 2017): 49–63. http://dx.doi.org/10.1515/jacsm-2017-0003.
Повний текст джерелаKitsos, P., N. Sklavos, K. Papadomanolakis, and O. Koufopavlou. "Hardware implementation of bluetooth security." IEEE Pervasive Computing 2, no. 1 (January 2003): 21–29. http://dx.doi.org/10.1109/mprv.2003.1186722.
Повний текст джерелаDadashzadeh, Mohammad. "Choosing IT Platforms In The Age Of Stuxnet." Journal of Cybersecurity Research (JCR) 2, no. 1 (December 1, 2017): 17–26. http://dx.doi.org/10.19030/jcr.v2i1.10076.
Повний текст джерелаZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Повний текст джерелаДисертації з теми "Software and hardware security"
Edmison, Joshua Nathaniel. "Hardware Architectures for Software Security." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29244.
Повний текст джерелаPh. D.
Patel, Krutartha Computer Science & Engineering Faculty of Engineering UNSW. "Hardware-software design methods for security and reliability of MPSoCs." Awarded by:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/44854.
Повний текст джерелаChakraborty, Rajat Subhra. "Hardware Security through Design Obfuscation." Cleveland, Ohio : Case Western Reserve University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1270133481.
Повний текст джерелаDepartment of EECS - Computer Engineering Title from PDF (viewed on 2010-05-25) Includes abstract Includes bibliographical references and appendices Available online via the OhioLINK ETD Center
Fießler, Andreas Christoph Kurt. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications." Doctoral thesis, Humboldt-Universität zu Berlin, 2019. http://dx.doi.org/10.18452/20023.
Повний текст джерелаNetwork devices like switches, bridges, routers, and firewalls are subject to a continuous development to keep up with ever-rising requirements. As the overhead of software network processing already became the performance-limiting factor for a variety of applications, also former software functions are shifted towards dedicated network processing hardware. Although such application-specific circuits allow fast, parallel, and low latency processing, they require expensive and time-consuming development with minimal possibilities for adaptions. Security can also be a major concern, as these circuits are virtually a black box for the user. Moreover, the highly parallel processing capabilities of specialized hardware are not necessarily an advantage for all kinds of tasks in network processing, where sometimes a classical CPU is better suited. This work introduces and evaluates concepts for building hybrid hardware-software-systems that exploit the advantages of both hardware and software approaches in order to achieve performant, flexible, and versatile network processing and packet classification systems. The approaches are evaluated on standard software systems, extended by a programmable hardware circuit (FPGA) to provide full control and flexibility. One key achievement of this work is the identification and mitigation of challenges inherent when a hybrid combination of multiple packet classification circuits with different characteristics is used. We introduce approaches to reduce redundant classification effort to a minimum, like re-usage of intermediate classification results and determination of dependencies by header space analysis. In addition, for some further challenges in hardware based packet classification like filtering circuits with dynamic updates and fast hash functions for lookups, we describe feasibility and optimizations. At last, the hybrid approach is evaluated using a standard SDN switch instead of the FPGA accelerator to prove portability.
Mendoza, Jose Antonio. "Hardware and Software Codesign of a JPEG2000 Watermarking Encoder." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9752/.
Повний текст джерелаRamsey, Glenn. "Hardware/software optimizations for elliptic curve scalar multiplication on hybrid FPGAs /." Online version of thesis, 2008. http://hdl.handle.net/1850/7765.
Повний текст джерелаZarate, Orozco Ismael. "Software and Hardware-In-The-Loop Modeling of an Audio Watermarking Algorithm." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc33221/.
Повний текст джерелаZaiets, Tetiana. "Diebold Nixdorf - global leader in providing innovative self-service technology, security systems and related services." Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/6690.
Повний текст джерелаFarag, Mohammed Morsy Naeem. "Architectural Enhancements to Increase Trust in Cyber-Physical Systems Containing Untrusted Software and Hardware." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/29084.
Повний текст джерелаPh. D.
Kalibjian, Jeff. "Virtualization Security Issues in Telemetry Post-Processing Environments." International Foundation for Telemetering, 2009. http://hdl.handle.net/10150/606000.
Повний текст джерелаVirtualization technologies have the potential to transform the telemetry post-processing environment. Significant efficiencies can be gained by migrating telemetry post processing activities to virtual computing platforms. However, while facilitating better server utilization, virtualization also presents several challenges; one of the most difficult of those challenges being security. In virtualization, server environments are replicated in software; unfortunately, the security individual servers provide is not replicated in a software stack implementation of a server environment. After reviewing virtualization fundamentals, security issues and their impact on telemetry post processing will be discussed.
Книги з теми "Software and hardware security"
Raj, Balwinder, and Arun Kumar Singh. Nanoelectronic Devices for Hardware and Software Security. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645.
Повний текст джерелаL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Boston, MA: Course Technology, Cengage Learning, 2010.
Знайти повний текст джерелаInc, ebrary, ed. Zabbix 1.8 network monitoring: Monitor your network's hardware, servers, and Web performance effectively and efficiently. Birmingham, U.K: Packt Pub., 2010.
Знайти повний текст джерелаMadden, Wayne. Implementing AS/400 security. Loveland, Colo: Duke Press, 1992.
Знайти повний текст джерелаMadden, Wayne. Implementing AS/400 security. 2nd ed. Loveland, Colo: Duke Press, 1995.
Знайти повний текст джерелаCarol, Woodbury, ed. Implementing AS/400 security. 3rd ed. Loveland Colo: Duke Press, 1998.
Знайти повний текст джерелаPascal, Paillier, and Verbauwhede Ingrid, eds. Cryptographic hardware and embedded systems - CHES 2007: 9th international workshop, Vienna, Austria, September 10-13, 2007 ; proceedings. Berlin: Springer, 2007.
Знайти повний текст джерела1971-, Jones Don, ed. Microsoft Windows server 2003 security administrator's companion. Redmond, Wash: Microsoft Press, 2003.
Знайти повний текст джерелаPatrick, Schaumont, and SpringerLink (Online service), eds. Cryptographic Hardware and Embedded Systems – CHES 2012: 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Знайти повний текст джерелаChristophe, Clavier, and Gaj Kris, eds. Cryptographic hardware and embedded systems - CHES 2009: 11th international workshop, Lausanne, Switzerland, September 6-9, 2009 ; proceedings. Berlin: Springer, 2009.
Знайти повний текст джерелаЧастини книг з теми "Software and hardware security"
Liu, Leibo, Shaojun Wei, Jianfeng Zhu, and Chenchen Deng. "Hardware Security and Reliability." In Software Defined Chips, 73–134. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7636-0_2.
Повний текст джерелаHossain, Muhammad Monir, Fahim Rahman, Farimah Farahmandi, and Mark Tehranipoor. "Software Security with Hardware in Mind." In Emerging Topics in Hardware Security, 309–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_12.
Повний текст джерелаAndroulidakis, Iosif I. "Software and Hardware Mobile Phone Tricks." In Mobile Phone Security and Forensics, 47–69. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29742-2_4.
Повний текст джерелаGoryachev, Alex. "Special Session on Security Verification." In Hardware and Software: Verification and Testing, 5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_5.
Повний текст джерелаBansal, Shonak, Krishna Parkash, Prince Jain, Sanjeev Kumar, Neena Gupta, and Arun K. Singh. "Photodetectors for Security Application." In Nanoelectronic Devices for Hardware and Software Security, 279–300. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645-14.
Повний текст джерелаMazzawi, Jamil, and Ziyad Hanna. "Formal Analysis of Security Data Paths in RTL Design." In Hardware and Software: Verification and Testing, 7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_7.
Повний текст джерелаYe, Mengmei, Myra B. Cohen, Witawas Srisa-an, and Sheng Wei. "EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security." In Search-Based Software Engineering, 377–82. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99241-9_24.
Повний текст джерелаMao, Wenbo, Fei Yan, Chuanjiang Yi, and Haibo Chen. "Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment." In Security Protocols, 204–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17773-6_27.
Повний текст джерелаFukase, Masa-aki, Hiroki Takeda, and Tomoaki Sato. "Hardware/Software Co-design of a Secure Ubiquitous System." In Computational Intelligence and Security, 385–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74377-4_41.
Повний текст джерелаSachidananda, Saraswathi, Srividya Gopalan, and Sridhar Varadarajan. "Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems." In Computational Intelligence and Security, 236–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596981_35.
Повний текст джерелаТези доповідей конференцій з теми "Software and hardware security"
Reina, Alessandro, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, and Danilo Bruschi. "When hardware meets software." In the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420962.
Повний текст джерелаLee, Robert P., Konstantinos Markantonakis, and Raja Naeem Akram. "Provisioning Software with Hardware-Software Binding." In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3103158.
Повний текст джерелаSingh, Ashwini Kumar, and Nagendra Kushwaha. "Software and Hardware Security of IoT." In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE, 2021. http://dx.doi.org/10.1109/iemtronics52119.2021.9422651.
Повний текст джерелаMosier, Nicholas, Hanna Lachnitt, Hamed Nemati, and Caroline Trippel. "Axiomatic hardware-software contracts for security." In ISCA '22: The 49th Annual International Symposium on Computer Architecture. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3470496.3527412.
Повний текст джерелаFerraz, André, and Carlos Ferraz. "Digital Identity Challenge: The Security and Convenience Dilemma." In Seminário Integrado de Software e Hardware. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/semish.2021.15829.
Повний текст джерелаLo, Dan Chia-Tien, Kai Qian, and Wei Chen. "Hardware Attacks and Security Education." In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.128.
Повний текст джерела"Computing & Processing (Hardware/Software). Information Security." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396290.
Повний текст джерелаEvans, David, and David Eyers. "Melding security metadata between software and hardware." In the Posters and Demo Track. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2405153.2405166.
Повний текст джерела"Special sessions: HSS: Hardware and software security." In 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 2018. http://dx.doi.org/10.1109/aqtr.2018.8402791.
Повний текст джерела"Computing & Processing(Hardware/Software). Information Security." In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2020. http://dx.doi.org/10.1109/eiconrus49466.2020.9039073.
Повний текст джерелаЗвіти організацій з теми "Software and hardware security"
Souppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320b.
Повний текст джерелаSouppaya, Murugiah. Hardware-Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320.
Повний текст джерелаBartock, Michael. Hardware Enabled Security:. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8320c.ipd.
Повний текст джерелаBartock, Michael, Murugiah Souppaya, Jerry Wheeler, Tim Knoll, Uttam Shetty, Ryan Savino, Joseprabu Inbaraj, Stefano Righi, and Karen Scarfone. Hardware-Enabled Security: Container Platform Security Prototype. National Institute of Standards and Technology, June 2021. http://dx.doi.org/10.6028/nist.ir.8320a.
Повний текст джерелаLeson, Joel L. Microcomputer Hardware and Software Management Program. Fort Belvoir, VA: Defense Technical Information Center, February 2001. http://dx.doi.org/10.21236/ada402387.
Повний текст джерелаSprinkle, Jonathan, and Brandon Eames. Multicore Hardware Experiments in Software Producibility. Fort Belvoir, VA: Defense Technical Information Center, June 2009. http://dx.doi.org/10.21236/ada502782.
Повний текст джерелаAggarwal, Aneesh. Low Overhead Software/Hardware Mechanisms for Software Assurance and Producibility. Fort Belvoir, VA: Defense Technical Information Center, February 2007. http://dx.doi.org/10.21236/ada464355.
Повний текст джерелаNguyen, Thuy D., Timothy E. Levin, Cynthia E. Irvin, Terry V. Benzel, and Ganesha Bhaskara. Preliminary Security Requirements for SecureCore Hardware. Fort Belvoir, VA: Defense Technical Information Center, September 2006. http://dx.doi.org/10.21236/ada457517.
Повний текст джерелаLei, Li. Hardware/Software Interface Assurance with Conformance Checking. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.2320.
Повний текст джерелаHopper, G. Future possibilities: Data, hardware, software and people. Office of Scientific and Technical Information (OSTI), January 1985. http://dx.doi.org/10.2172/6566336.
Повний текст джерела