Personal tools

Search results

From iis-projects

Jump to: navigation, search

Page title matches

  • category = SW/HW Predictability and Security category = SW/HW Predictability and Security
    1 KB (155 words) - 21:03, 19 November 2021
  • category = HW/SW Safety and Security category = HW/SW Safety and Security
    5 KB (614 words) - 09:49, 15 January 2024
  • ...e identification to be built into autonomous systems, which can be used in security and surveillance applications. Due to the complexity of the task, the proje
    4 KB (602 words) - 10:45, 31 January 2023

Page text matches

  • #REDIRECT [[BLISS - Battery-Less Identification System for Security]]
    69 bytes (8 words) - 14:54, 25 April 2018
  • category = SW/HW Predictability and Security category = SW/HW Predictability and Security
    1 KB (155 words) - 21:03, 19 November 2021
  • These days, security breaches are omnipresent in our daily news thanks to the NSA and others. Th ...are interested in working on hardware implementations of state-of-the-art security algorithms, which may become part of any future credit card or WiFi standar
    2 KB (317 words) - 13:13, 14 April 2016
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (440 words) - 10:53, 15 November 2022
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (483 words) - 15:28, 19 February 2024
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (347 words) - 14:07, 4 March 2024
  • ...FreeRTOS to run on PULP platforms. However, the ever increase demanding of security on embedded systems make it necessary to run more complex operating systems For instance, tiny operating sytems with minimalistic security need at least machine (M) and user (U) mode to be implemented in the core,
    4 KB (661 words) - 08:38, 20 January 2021
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (379 words) - 09:32, 15 January 2024
  • .... So just drop me an e-mail or come into my office in order to discuss any security- or cryptography-related topics.
    1 KB (139 words) - 12:39, 7 November 2017
  • [[Category:HW/SW Safety and Security]] ...Interested students can also investigate applicability of this approach to security-critical systems [3] or explore more complex architectures to cover also ha
    5 KB (752 words) - 13:23, 24 October 2023
  • ...in systems with wide bandwidth, high energy-​efficiency, low latency, and security.
    1 KB (145 words) - 16:26, 27 September 2023
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (391 words) - 08:49, 21 June 2022
  • ...hash algorithms are two of the most important cryptographic primitives in security protocols. As security becomes more and more important also in resource-constrained environments,
    3 KB (434 words) - 12:01, 26 March 2015
  • [[Category:HW/SW Safety and Security]]
    1 KB (165 words) - 17:19, 13 November 2023
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (438 words) - 16:51, 5 August 2022
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (460 words) - 15:29, 19 February 2024
  • ...''security needs a new hardware-software contract''' [Ge2018a], [Ge2018b]. Security is and has always been the operating system's (OS) job. For instance, memor * familiarity with basic system security principles
    6 KB (915 words) - 18:16, 20 May 2020
  • security. It is designed to be implemented efficiently on both hardware and software * 128 bit or 256 bit key security
    3 KB (423 words) - 11:13, 13 June 2014
  • [[Category:HW/SW Safety and Security]]
    1 KB (193 words) - 15:09, 25 October 2023
  • [[Category:SW/HW Predictability and Security]] [[Category:HW/SW Safety and Security]]
    3 KB (484 words) - 20:29, 21 February 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)