Personal tools

Search results

From iis-projects

Jump to: navigation, search

Page title matches

Page text matches

  • #REDIRECT [[HW/SW Safety and Security]]
    28 members (0 subcategories, 0 files) - 18:36, 23 November 2021
  • #Redirect [[SW/HW Predictability and Security]]
    14 members (0 subcategories, 0 files) - 22:53, 5 February 2021
  • #REDIRECT [[BLISS - Battery-Less Identification System for Security]]
    69 bytes (8 words) - 14:54, 25 April 2018
  • category = SW/HW Predictability and Security category = SW/HW Predictability and Security
    1 KB (155 words) - 21:03, 19 November 2021
  • ...ed unbreakable, provided the keys are sufficiently long. However, absolute security can only be guaranteed by the so-called one-time-pad (OTP), where secret ke ...QKD, to allow the rapid changing of keys, thus considerably improving the security and simplifying the key management.
    2 members (0 subcategories, 0 files) - 17:27, 28 January 2014
  • These days, security breaches are omnipresent in our daily news thanks to the NSA and others. Th ...are interested in working on hardware implementations of state-of-the-art security algorithms, which may become part of any future credit card or WiFi standar
    2 KB (317 words) - 13:13, 14 April 2016
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (440 words) - 10:53, 15 November 2022
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (483 words) - 15:28, 19 February 2024
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (347 words) - 14:07, 4 March 2024
  • ...FreeRTOS to run on PULP platforms. However, the ever increase demanding of security on embedded systems make it necessary to run more complex operating systems For instance, tiny operating sytems with minimalistic security need at least machine (M) and user (U) mode to be implemented in the core,
    4 KB (661 words) - 08:38, 20 January 2021
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (379 words) - 09:32, 15 January 2024
  • .... So just drop me an e-mail or come into my office in order to discuss any security- or cryptography-related topics.
    1 KB (139 words) - 12:39, 7 November 2017
  • [[Category:HW/SW Safety and Security]] ...Interested students can also investigate applicability of this approach to security-critical systems [3] or explore more complex architectures to cover also ha
    5 KB (752 words) - 13:23, 24 October 2023
  • ...in systems with wide bandwidth, high energy-​efficiency, low latency, and security.
    1 KB (145 words) - 16:26, 27 September 2023
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (391 words) - 08:49, 21 June 2022
  • ...hash algorithms are two of the most important cryptographic primitives in security protocols. As security becomes more and more important also in resource-constrained environments,
    3 KB (434 words) - 12:01, 26 March 2015
  • [[Category:HW/SW Safety and Security]]
    1 KB (165 words) - 17:19, 13 November 2023
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (438 words) - 16:51, 5 August 2022
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (460 words) - 15:29, 19 February 2024
  • ...''security needs a new hardware-software contract''' [Ge2018a], [Ge2018b]. Security is and has always been the operating system's (OS) job. For instance, memor * familiarity with basic system security principles
    6 KB (915 words) - 18:16, 20 May 2020

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)