We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Security Verification

    Security of a system on chip (SoC) can be weakened by exploiting the inherent and potential vulnerabilities of the intellectual property (IP) cores...
    Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi in Hardware Security Training, Hands-on!
    Chapter 2023
  2. An improved blockchain framework for ORAP verification and data security in healthcare

    Currently, the move from traditional healthcare to smart healthcare systems is greatly aided by current technology. Healthcare proposes a new...

    Parag Rastogi, Devendra Singh, Sarabjeet Singh Bedi in Journal of Ambient Intelligence and Humanized Computing
    Article 12 April 2024
  3. SoC Security Verification Using Fuzz, Penetration, and AI Testing

    The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the tremendous modernization of these architectures. For a modern...
    Mark Tehranipoor, Kimia Zamiri Azar, ... Farimah Farahmandi in Hardware Security
    Chapter 2024
  4. RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system

    Internet of Things (IoT) is a multiple heterogeneous network, and its perception layer is often faced with various security threats. As the bridge...

    P. Kamakshi, Y. Bhavani, ... T. Mahesh Kumar in Soft Computing
    Article 31 March 2022
  5. CAD for Hardware/Software Security Verification

    Security validation and verification have become challenging due to the complexity of the modern system-on-chip (SoC) design. Existing verification...
    Farimah Farahmandi, M. Sazadur Rahman, ... Mark Tehranipoor in CAD for Hardware Security
    Chapter 2023
  6. A formal security analysis of the fast authentication procedure based on the security context in 5G networks

    The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...

    Zhiwei Cui, Baojiang Cui, ... Junsong Fu in Soft Computing
    Article 10 January 2024
  7. An efficient group signature based certificate less verification scheme for vehicular ad-hoc network

    Vehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET,...

    S. Jayashree, S. V. N. Santhosh Kumar in Wireless Networks
    Article 18 April 2024
  8. Verification

    This chapter emphasizes the critical need for thorough verification of embedded systems, building upon the advantages of SystemC models outlined in...
    Chapter 2024
  9. Metrics for SoC Security Verification

    Due to the persistency of hardware vulnerabilities, they are generally considered harder to resolve than software vulnerabilities. Accordingly, it is...
    Farimah Farahmandi, M. Sazadur Rahman, ... Mark Tehranipoor in CAD for Hardware Security
    Chapter 2023
  10. A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs

    Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation...

    Lalit Negi, Devender Kumar in Wireless Personal Communications
    Article 01 February 2024
  11. Security assessment and improvement of building ethernet KNXnet/IP protocol

    KNXnet/IP is a KNX-building automation protocol that communicates through an IP network. It is mainly used in the field of smart home and building...

    Tao Feng, Bugang Zhang, ... Lu Zheng in Discover Applied Sciences
    Article Open access 23 March 2024
  12. Non-Invasive Hardware Trojans Modeling and Insertion: A Formal Verification Approach

    In modern chip designs, shared resources are used extensively. Arbiters usage is crucial to settle conflicts when multiple requests compete for these...

    Hala Ibrahim, Haytham Azmi, ... Mona Safar in Journal of Electronic Testing
    Article Open access 01 February 2024
  13. An improved lattice based certificateless data integrity verification techniques for cloud computing

    Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...

    Dilli Babu Salvakkam, Rajendra Pamula in Journal of Ambient Intelligence and Humanized Computing
    Article 26 April 2023
  14. Cancelable templates for secure face verification based on deep learning and random projections

    Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address...

    Arslan Ali, Andrea Migliorati, ... Enrico Magli in EURASIP Journal on Information Security
    Article Open access 08 March 2024
  15. Vulnerability issues in Automatic Speaker Verification (ASV) systems

    Claimed identities of speakers can be verified by means of automatic speaker verification (ASV) systems, also known as voice biometric systems....

    Priyanka Gupta, Hemant A. Patil, Rodrigo Capobianco Guido in EURASIP Journal on Audio, Speech, and Music Processing
    Article Open access 10 February 2024
  16. 3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things

    The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...

    Article 01 March 2024
  17. Attentional multi-feature fusion for spoofing-aware speaker verification

    The Spoofing-Aware Speaker Verification (SASV) system is designed to protect automatic speaker verification (ASV) systems from potential speech...

    Qian Shen, Mengxi Guo, ... Jianfen Ma in International Journal of Speech Technology
    Article 09 June 2024
  18. Hybrid Internet of Things (IoT) data transmission security corresponding to device verification

    The Internet Of Things (IoT) devices are popular and deployed generally. Due to the wireless data transmission between each IoT device and remote...

    Ming-Shen Jian, Jimmy Ming-Tai Wu in Journal of Ambient Intelligence and Humanized Computing
    Article 30 March 2021
  19. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

    Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...

    M. S. Minu, P. Jona Innisai Rani, ... A. Rajesh in Peer-to-Peer Networking and Applications
    Article 18 April 2024
  20. Enhancing Anonymity of Internet of Vehicle Identities in Connected Vehicle Security Services Using Batch Verification Algorithm

    This paper proposes a solution for enhancing the anonymity of Internet of vehicle identities in the security services of connected vehicles, which...
    Abhishek Dwivedi, Ratish Agarwal, Piyush Kumar Shukla in Data Science and Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.