Search results
From iis-projects
Create the page "Security" on this wiki! See also the search results found.
Page title matches
- ...e identification to be built into autonomous systems, which can be used in security and surveillance applications. Due to the complexity of the task, the proje4 KB (602 words) - 10:45, 31 January 2023
- category = SW/HW Predictability and Security category = SW/HW Predictability and Security1 KB (155 words) - 21:03, 19 November 2021
- category = HW/SW Safety and Security category = HW/SW Safety and Security5 KB (614 words) - 09:49, 15 January 2024
Page text matches
- * [[HW/SW Safety and Security]]5 KB (537 words) - 15:22, 23 February 2024
- ...the new one, although there is no convincing reason to do so by now from a security point of view. The design re- quires approximately 8.3 kGE targeting a 1802 KB (302 words) - 12:09, 26 March 2015
- ...hash algorithms are two of the most important cryptographic primitives in security protocols. As security becomes more and more important also in resource-constrained environments,3 KB (434 words) - 12:01, 26 March 2015
- ...ysical systems (CPS) applications in environmental monitoring, healthcare, security, and industrial domains, among others, due to the flexible distribution of4 KB (613 words) - 19:54, 9 February 2015
- These days, security breaches are omnipresent in our daily news thanks to the NSA and others. Th ...are interested in working on hardware implementations of state-of-the-art security algorithms, which may become part of any future credit card or WiFi standar2 KB (317 words) - 13:13, 14 April 2016
- security. It is designed to be implemented efficiently on both hardware and software * 128 bit or 256 bit key security3 KB (423 words) - 11:13, 13 June 2014
- ...ysical systems (CPS) applications in environmental monitoring, healthcare, security, and industrial domains, among others, due to the flexible distribution of3 KB (378 words) - 19:56, 9 February 2015
- ...information, protecting their privacy while enabling better information to security personnel.3 KB (408 words) - 13:17, 5 February 2016
- ...information, protecting their privacy while enabling better information to security personnel.9 KB (1,289 words) - 19:45, 24 March 2015
- rect 2600 0 3900 910 [[HW/SW Safety and Security]] * '''[[HW/SW Safety and Security]]'''7 KB (811 words) - 15:21, 23 February 2024
- .... So just drop me an e-mail or come into my office in order to discuss any security- or cryptography-related topics.1 KB (139 words) - 12:39, 7 November 2017
- Imaging sensor networks, UAVs, smartphones, and embedded industrial and security computer vision systems require power-efficient, low-cost and high-speed im5 KB (747 words) - 18:04, 29 August 2016
- ...eby a signal is weakened on the way to its destination, as well as causing security worries due to the distance the signal travels around the user being suscep4 KB (576 words) - 16:58, 28 July 2017
- ...or autonomous IoT systems or data which should not be sent to a server for security or privacy reason (e.g. Siri could be trained on a server and fine-tuned wi6 KB (842 words) - 08:37, 20 January 2021
- ...e identification to be built into autonomous systems, which can be used in security and surveillance applications. Due to the complexity of the task, the proje4 KB (602 words) - 10:45, 31 January 2023
- category = SW/HW Predictability and Security category = SW/HW Predictability and Security1 KB (155 words) - 21:03, 19 November 2021
- #REDIRECT [[BLISS - Battery-Less Identification System for Security]]69 bytes (8 words) - 14:54, 25 April 2018
- ...FreeRTOS to run on PULP platforms. However, the ever increase demanding of security on embedded systems make it necessary to run more complex operating systems For instance, tiny operating sytems with minimalistic security need at least machine (M) and user (U) mode to be implemented in the core,4 KB (661 words) - 08:38, 20 January 2021
- ...interface to NAND flash ICs to study their behavior and argue about their security.4 KB (551 words) - 11:06, 11 July 2019
- ...electronics consumer market. Smartwatches for fitness tracking, camera for security and multimedia entertaining as well as biomedical devices as ECG and EEG we7 KB (1,030 words) - 19:05, 29 January 2021
- ...''security needs a new hardware-software contract''' [Ge2018a], [Ge2018b]. Security is and has always been the operating system's (OS) job. For instance, memor * familiarity with basic system security principles6 KB (915 words) - 18:16, 20 May 2020
- ...nuclear material when detected at places such as border crossings or other security checkpoints. The main technological challenge of detecting fast neutrons is ...d of further development in order to find a suitable solution for in-field security applications. This is the purpose of this project. There is interest in thi5 KB (623 words) - 10:32, 5 November 2019
- ...mislabeling them during run time. It is clear that this shows the issue of security and safety in the use of DNNs in the real world applications. The student4 KB (509 words) - 15:41, 10 November 2020
- ...interference cancellation." IEEE Transactions on Information Forensics and Security 11(7), 2016, 1486-1499.5 KB (662 words) - 13:31, 10 May 2023
- ...ure ranging procedures require a microcontroller core on-chip and a set of security functions including secure storage, key generation, key exchange, encryptio ...AC layer secure ranging procedures in the IEEE 802.15.4z and elaborate the security requirements for the RISC-V core.8 KB (1,139 words) - 19:10, 29 January 2021
- [[File:5G-Security.jpg|thumb|400px|5G Security, Source: https://5g.security]]3 KB (404 words) - 10:05, 9 February 2021
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (391 words) - 08:49, 21 June 2022
- ...nowledge among multiple parties without compromising user privacy and data security.</p></li>11 KB (1,610 words) - 11:00, 14 November 2022
- [https://www.iaik.tugraz.at/ IAIK] has been active in the field of hardware security and privacy for more than 30 years and today is among the most renowned res ...itan] project where it - together with partners such as Google, G+D Mobile Security, Nuvoton Technologies, Western Digital and ETH Zürich - is building the fi6 KB (849 words) - 18:43, 23 November 2021
- ...nfigurations for higher performance (3.13 CoreMark/MHz) or with additional security features.6 KB (835 words) - 12:52, 27 April 2021
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (440 words) - 10:53, 15 November 2022
- ...ach leads to accurate classification of the streamed data, it also poses a security risk, since surveillance data is highly sensitive.3 KB (433 words) - 15:36, 4 August 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]4 KB (508 words) - 18:59, 10 January 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (467 words) - 13:55, 12 October 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]8 KB (1,127 words) - 19:54, 1 March 2023
- category = HW/SW Safety and Security category = HW/SW Safety and Security5 KB (614 words) - 09:49, 15 January 2024
- ...resting research questions about software architecture, operating systems, security, and hardware [6]. For example, the steady move from monolithic application6 KB (905 words) - 21:41, 6 December 2021
- [[Category:HW/SW Safety and Security]]2 KB (337 words) - 08:49, 21 June 2022
- [[Category:HW/SW Safety and Security]]2 KB (348 words) - 13:16, 24 October 2023
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]4 KB (515 words) - 15:06, 5 August 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]6 KB (835 words) - 16:27, 7 July 2023
- [[Category:HW/SW Safety and Security]]2 KB (311 words) - 08:49, 21 June 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]6 KB (869 words) - 14:47, 7 July 2023
- ...dard is a promising candidate in terms of its excellent power consumption, security, range, and reliability. The goal of this semester project is to perform a5 KB (586 words) - 15:34, 11 July 2022
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (483 words) - 15:28, 19 February 2024
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (438 words) - 16:51, 5 August 2022
- [[Category:HW/SW Safety and Security]]4 KB (497 words) - 14:15, 29 June 2023
- [[Category:HW/SW Safety and Security]]3 KB (454 words) - 14:59, 25 October 2023
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (379 words) - 09:32, 15 January 2024
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (347 words) - 14:07, 4 March 2024
- [[Category:HW/SW Safety and Security]] ...Interested students can also investigate applicability of this approach to security-critical systems [3] or explore more complex architectures to cover also ha5 KB (752 words) - 13:23, 24 October 2023
- ...systems with wide bandwidth, high energy-efficiency, low latency, and security.1 KB (145 words) - 16:26, 27 September 2023
- ...sable pillar of modern infrastructure, jamming attacks turn into a crucial security threat. The widespread adoption of safety-critical technologies such as aut3 KB (385 words) - 16:23, 20 September 2023
- ...sable pillar of modern infrastructure, jamming attacks turn into a crucial security threat. The widespread adoption of safety-critical technologies such as aut2 KB (257 words) - 16:22, 20 September 2023
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (484 words) - 20:29, 21 February 2024
- [[Category:HW/SW Safety and Security]]3 KB (383 words) - 14:29, 18 February 2024
- [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]3 KB (460 words) - 15:29, 19 February 2024
- [[Category:HW/SW Safety and Security]]2 KB (267 words) - 14:22, 27 February 2024
- [[Category:HW/SW Safety and Security]]2 KB (273 words) - 14:23, 27 February 2024
- [[Category:HW/SW Safety and Security]]2 KB (259 words) - 11:55, 18 December 2023
- [[Category:HW/SW Safety and Security]]1 KB (193 words) - 15:09, 25 October 2023
- [[Category:HW/SW Safety and Security]]3 KB (342 words) - 13:02, 12 February 2024
- [[Category:HW/SW Safety and Security]]1 KB (165 words) - 17:19, 13 November 2023