Search

Your search keyword '"Computer security compromised by hardware failure"' showing total 142 results

Search Constraints

Start Over You searched for: Descriptor "Computer security compromised by hardware failure" Remove constraint Descriptor: "Computer security compromised by hardware failure"
142 results on '"Computer security compromised by hardware failure"'

Search Results

1. Verification of a Practical Hardware Security Architecture Through Static Information Flow Analysis

2. Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems

3. A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement

4. The Design and Implementation of Embedded Security CPU Based on Multi‐strategy

5. Computer security is broken

6. State-of-the-art research on electromagnetic information security

7. A Trusted IaaS Environment with Hardware Security Module

8. Hardware attacks: an algebraic approach

9. Hardware Level Security in e-Wallet: Today’s Need

10. Introduction to Hardware Security

11. Rethinking Computers for Cybersecurity

12. A Hardware Design Language for Timing-Sensitive Information-Flow Security

13. Analyzing security breaches of countermeasures throughout the refinement process in hardware design flow

14. Hardware-Assisted Security

15. Exploiting hardware obfuscation methods to prevent and detect hardware Trojans

16. Secure Information Flow Verification with Mutable Dependent Types

17. Methods for Safeguarding Client Data

18. Security Threats and Countermeasures in Three-Dimensional Integrated Circuits

19. The information security system synthesis using the graphs theory

20. Using computational game theory to guide verification and security in hardware designs

21. Proposal of hardware device model for IoT endpoint security and its implementation

22. A Primer on Hardware Security: Models, Methods, and Metrics

23. Hardware security and test: Friends or enemies?

24. Trojan Vulnerability Map: An Efficient Metric for Modeling and Improving the Security Level of Hardware

25. Discussion on the Computer Security Technology and E-Commerce Transaction Security

26. Inspection-Resistant Memory Architectures

27. Analysis of a hardware security module's high-availability setting

28. Design of FPGA Hardware Accelerator for Information Security System

29. Hardware Support for Authentication in Cyber Physical Systems

30. An abstraction model and a comparative analysis of Intel and ARM hardware isolation mechanisms

31. Security Down to the Hardware Level

32. Hardware Security for Critical Infrastructures - The CIPSEC Project Approach

33. Hardware Security and Trust

34. Towards Property Driven Hardware Security

35. Private Circuits III

36. Detecting and thwarting hardware trojan attacks in cyber-physical systems

37. Exploration of the Computer Hardware Experiment teaching method based on the cloud platform

38. Hardware Security Challenges Beyond CMOS: Attacks and Remedies

39. Invited - Who is the major threat to tomorrow's security?

40. Hardware Attacks and Security Education

41. Security of emerging non-volatile memories: Attacks and defenses

42. Building trust in 3PIP using asset-based security property verification

43. Hardware Covert Attacks and Countermeasures

44. SPARCHS: Symbiotic, Polymorphic, Automatic, Resilient, Clean-Slate, Host Security

45. Hardware Cost Measurement of Lightweight Security Protocols

46. High Performance Physical Environmental Security using Distributed Cooperative Sensor Nodes

47. Quantifying Hardware Security Using Joint Information Flow Analysis

48. F1: Designing secure systems: Manufacturing, circuits and architectures

49. SpecCert: Specifying and Verifying Hardware-Based Security Enforcement

50. Toward Application-Aware Security and Reliability

Catalog

Books, media, physical & digital resources