Security and performance in IoT: A balancing act
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by
2022, performance of these low powered devices, as well as security is of utmost …
2022, performance of these low powered devices, as well as security is of utmost …
Data security utilizing a memristive coupled neural network in 3D models
This article proposes a novel double data security algorithm that first encrypts sensitive data
using a two-stage encryption method based on numerical solutions from a fractional-order …
using a two-stage encryption method based on numerical solutions from a fractional-order …
Quantifiable assurance: from IPs to platforms
Hardware vulnerabilities are generally considered more difficult to fix than software ones
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …
because they are persistent after fabrication. Thus, it is crucial to assess the security and fix …
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications
An individual's privacy is a significant concern in surveillance videos. Existing research work
into the location of individuals on the basis of detecting their skin is focused either on …
into the location of individuals on the basis of detecting their skin is focused either on …
EETD: An energy efficient design for runtime hardware trojan detection in untrusted network-on-chip
Network-on-chip (NoC) is a communication intellectual property (IP) core, popularly used in
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
the system-on-a-chip (SoC) designs. The NoC IP core often comes from an untrusted 3rd …
Specifying a principle of cryptographic justice as a response to the problem of going dark
M Wilson - Ethics and Information Technology, 2023 - Springer
Over the past decade, the Five Eyes Intelligence community has argued cryptosystems with
end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence …
end-to-end encryption (E2EE) are disrupting the acquisition and analysis of digital evidence …
RFTC: Runtime frequency tuning countermeasure using FPGA dynamic reconfiguration to mitigate power analysis attacks
Random execution time-based countermeasures against power analysis attacks have
reduced resource overheads when compared to balancing power dissipation and masking …
reduced resource overheads when compared to balancing power dissipation and masking …
FPGA based countermeasures against side channel attacks on block ciphers
D Jayasinghe, B Udugama… - … of the 28th Asia and South …, 2023 - dl.acm.org
Field Programmable Gate Arrays (FPGAs) are increasingly ubiquitous. FPGAs enable
hardware acceleration and reconfigurability. Any security breach or attack on critical …
hardware acceleration and reconfigurability. Any security breach or attack on critical …
Sentry-NoC: A statically-scheduled NoC for secure SoCs
SoC security has become essential with devices now pervasive in critical infrastructure in
homes and businesses. Today's embedded SoCs are becoming increasingly high …
homes and businesses. Today's embedded SoCs are becoming increasingly high …
Uclod: Small clock delays to mitigate remote power analysis attacks
This paper presents UCloD, a novel random clock delay-based robust and scalable
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …
countermeasure against recently discovered remote power analysis (RPA) attacks. UCloD …