„hardware security“
Suchergebnisse
1.000+ Treffer
-
Global trends in the standardization of the burglary-resistance testing of security hardware
-
Safety und Security
-
Umfassende Sicherheit – Safety und Security im Kontext autonomer Systeme
-
Transitional leakage in theory and practice : unveiling security flaws in masked circuits
-
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures (Adv. Mater. 23/2024)
-
A comprehensive review of lightweight blockchain practices for smart cities: a security and efficacy assessment
-
Quantum security analysis of a lattice-based oblivious transfer protocol
-
Unpredictably Disordered Distribution of Hetero‐Blended Graphene Oxide Flakes with Non‐Identical Resistance in Physical Unclonable Functions (Adv. Funct. Mater. 48/2023)
-
Printable Epsilon‐Type Structure Transistor Arrays with Highly Reliable Physical Unclonable Functions (Adv. Mater. 16/2023)
-
Hardware‐Based Security: A Combination of a Volatile‐Memristor‐Based True Random‐Number Generator and a Nonlinear‐Feedback Shift Register for High‐Speed Encryption (Adv. Electron. Mater. 5/2020)
-
In Situ Encryption: Cryptographic Key Generation and In Situ Encryption in One‐Transistor‐One‐Resistor Memristors for Hardware Security (Adv. Electron. Mater. 5/2021)
-
Insights into FPGA configuration security
-
Security on plastics: fake or real?
-
Second-order SCA security with almost no fresh randomness
-
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions
-
Silicon Based Security for Protection Against Hardware Vulnerabilities
-
Composable gadgets with reused fresh masks : first-order probing-secure hardware circuits with only 6 fresh masks
-
Alignment of safety and security risk assessments for modular production systems
-
Untersuchung des forensischen Nutzen von Smart Home Security Systemen : Daten- und Hardwareanalyse sowie Manipulationsversuche am Beispiel eines RING Security Systems
-
Untersuchung des forensischen Nutzen von Smart Home Security Systemen : Daten- und Hardwareanalyse sowie Manipulationsversuche am Beispiel eines RING Security Systems