Filters








15,893 Hits in 4.0 sec

Secure Physical Computation Using Disposable Circuits [chapter]

Ben A. Fisch, Daniel Freund, Moni Naor
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper takes an orthogonal approach using disposable circuits (DC)-cheap hardware tokens that can be completely destroyed after a computation-an extension of the familiar tamper-proof token model.  ...  In a secure physical computation, a set of parties each have physical inputs and jointly compute a function of their inputs in a way that reveals no information to any party except for the output of the  ...  Fig. 3 . 3 Ideal world physical 2PC Fig. 4 . 4 SPV from secure 2PC. Fig. 5 . 5 Schematic of the physical setup for secure physical 2PC using disposable circuits (Protocol 2).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_9">doi:10.1007/978-3-662-46494-6_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4xbamc5jujdhfa5r2liv7qc6ia">fatcat:4xbamc5jujdhfa5r2liv7qc6ia</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160803235401/http://eprint.iacr.org/2015/226.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/71/a871e621fb33a7b79e790b0f534041994a46374f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Cryptography with Disposable Backdoors

Kai-Min Chung, Marios Georgiou, Ching-Yi Lai, Vassilis Zikas
<span title="2019-08-20">2019</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ld7penalpndgxesxlh3sf425ee" style="color: black;">Cryptography</a> </i> &nbsp;
We further describe how to use our ideas to derive a version of CCA-secure public key encryption, which is accompanied with a disposable (i.e., single-use, as in the above scenario) backdoor.  ...  computation and classical stateless hardware tokens.  ...  Physical computation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/cryptography3030022">doi:10.3390/cryptography3030022</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/witjh4fx75d7vnnpxwozbqilky">fatcat:witjh4fx75d7vnnpxwozbqilky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200211211518/https://res.mdpi.com/d_attachment/cryptography/cryptography-03-00022/article_deploy/cryptography-03-00022.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/2e/382e26a733964d472f77c48a4b6ad3abb342ea88.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/cryptography3030022"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Proposed Solution of e-Waste Management

Ashwani Kush, Anupam Arora
<span title="">2013</span> <i title="EJournal Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hvh5w7m2xzcrhkbhz4hppekzju" style="color: black;">International Journal of Future Computer and Communication</a> </i> &nbsp;
This definition includes used electronics which are destined for reuse, resale, salvage, recycling, or disposal.  ...  Electronic waste may be defined as discarded computers, office electronic equipment, entertainment device electronics, mobile phones, television sets and refrigerators.  ...  equipments and circuit boards.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijfcc.2013.v2.212">doi:10.7763/ijfcc.2013.v2.212</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6g53u3qhfbrpbtlfxomikyyba">fatcat:n6g53u3qhfbrpbtlfxomikyyba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20161123050847/http://www.ijfcc.org:80/papers/212-S060.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/27/942701db5b198350e514cc8b7a752107a8d99aa9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijfcc.2013.v2.212"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Technology confronts SARS

Marilynn Larkin
<span title="">2003</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kowyypahlzcqxlzyk7nwiadqie" style="color: black;">Lancet. Infectious Diseases (Print)</a> </i> &nbsp;
Infrared sensor to detect SARS The Shanghai Institute of Technology and Physics recently invented an infrared sensor that can determine a person's body temperature without physical contact.  ...  software similar to computer security programs that track computer viruses across networks, reports Straits Times.  ...  One product, a sachet, could be used to discourage spitting in the streets; people spit instead into the sachet, which disinfects the phlegm and can be disposed of later.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1473-3099(03)00677-7">doi:10.1016/s1473-3099(03)00677-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eat7j7kdbbhtzpsdvdcv7ahjge">fatcat:eat7j7kdbbhtzpsdvdcv7ahjge</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200329043830/https://pdf.sciencedirectassets.com/272254/1-s2.0-S1473309900X00242/1-s2.0-S1473309903006777/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENT%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIHKuttuGrN%2B9OZI8mj9qOcPjrikUcG0g5XQR478D%2FudTAiEA9MYdBbySpKNWeI3qbmb9yWANXjgFsqUZ9lEIn7ly2uAqvQMIzf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARACGgwwNTkwMDM1NDY4NjUiDHsN9jzqLuRQfGlrKCqRA1sVLhOa2xS6ojQ2%2FfpbG5ki0IWVnpbZvvKtL%2FM13G%2FTC0hIActKwHtfNpSwPqRXI0zhohtxPSqfrJzwVzsdm2IWHRUT3qXXvTTDpWcqZdi0xjxBhA%2F9b%2Bwd1QGtlzpiUcBkizDnt%2Fc6ufANvufJAENzN8Uk%2BHzqwQ1FnCci5DRS7gbrk3xF5smLAd8XzCcRCCdZYgIUNrZAtgbVxLVjQ4jFRgK%2Bp1bkFCaqIaXL1rOdPhm8QdizICRhRMaeUWAkHnmKFldOv6HqQFYHD9oaH2M4emMw84lt7dBieyEBVGL0ekDd9Va5OTJCcwhLBbym2nciO9BttKkxvz6WjOfmjmHXREBGGxDZ2021QKEty2o1AkKyC1bCvkrakv5lRfAevB%2F1GDxAHAxVPOv8X%2Feb0T%2FRDlZ6rC2cfanz9Dqw5l4KaRipFYLLRY0ylRG7sMcAd3e%2FPelwCqAGwUYA4%2B%2FL3BZoNYAHlfcaPtivAthyqa0A3PrWAPpMDT%2F3%2FgkSdt2mJh%2Bv2xuZw9OlwBIiaiktWhS2MLqvgPQFOusB89LzqV38SXjXKciwOZeBbGyW0SZGgSo27kJnxN9%2FGrIkLqR8QwnQ0fHmUFnlH786IaqBGa5vqboF2hk5%2BJhJcnR4CcyHND1BHcwJ3zlQaSa7HzAcT%2BA42cmrKjQN9RgMvzferY71US7kdewhi9CWvgtZ04wUz3sMlKwI7hY7nES3Ah%2Bp3dGFOxuAyX9VunJcba6OcMaEkalQmUXMJn83BjK%2B2ZirtdXgkrMSqegL%2F8OpMt9lH5aS19fy2y9ulD9fTtdl51fooXXtoeJPDahDrGDRbrFlazZZiTqssFQOe4AAuzcHbEQzBVc%2FUQ%3D%3D&amp;X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Date=20200329T043826Z&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Expires=300&amp;X-Amz-Credential=ASIAQ3PHCVTYZIYW6U7L%2F20200329%2Fus-east-1%2Fs3%2Faws4_request&amp;X-Amz-Signature=7317db5b443aa34d279e1a4653f03ed9257ab0c81870115e65ccfe2019490f2a&amp;hash=a7226423cd8a777f8a877ab573b909486348c36a52eca3ceedc64290e05f33d5&amp;host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&amp;pii=S1473309903006777&amp;tid=spdf-654ded95-b85b-47a4-afba-961e5f3c1031&amp;sid=bd25f0643eb2714f319ab354d66ba3992a3dgxrqa&amp;type=client" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d6/7f/d67fe1ea4da65f8e0cd49d7637d180254d83d18c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/s1473-3099(03)00677-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Cryptography Goes to the Cloud [chapter]

Isaac Agudo, David Nuñez, Gabriele Giammatteo, Panagiotis Rizomiliotis, Costas Lambrinoudakis
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jyopc6cf5ze5vipjlm4aztcffi" style="color: black;">Communications in Computer and Information Science</a> </i> &nbsp;
encryption and secure outsourced computation will become popular in the near future, opening the doors of the Cloud to customers with higher security requirements.  ...  In this paper we identify some areas where cryptography can help a rapid adoption of cloud computing.  ...  That means that the garbled circuits can be used only once and their size is proportional to the size of the function to be computed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-22365-5_23">doi:10.1007/978-3-642-22365-5_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hiv6tmgbczf5jkwjqnr5augku4">fatcat:hiv6tmgbczf5jkwjqnr5augku4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809082414/https://www.nics.uma.es/sites/default/files/papers/agudo2011cryptography.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/83/6a834271f7207ee7a81799dc1e9d7c3e3de05266.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-22365-5_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

SafePay: Protecting against credit card forgery with existing magnetic card readers

Yinzhi Cao, Xiang Pan, Yan Chen
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m37r6seibve4bbsmm5f464tigm" style="color: black;">2015 IEEE Conference on Communications and Network Security (CNS)</a> </i> &nbsp;
drives a magnetic card chip to simulate the behavior of a physical magnetic card.  ...  To tackle the problem, researchers have proposed several new techniques such as integrated circuit card (IC card) and mobile wallet applications [1]; however, none of them can support existing magnetic  ...  Broadly speaking, our SafePay is related to Cyber-Physical System (CPS), a system consisting of computational elements controlling physical entities.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2015.7346825">doi:10.1109/cns.2015.7346825</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cns/CaoPC15.html">dblp:conf/cns/CaoPC15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rzx2c5ms5ffmtgtepz6quq3aje">fatcat:rzx2c5ms5ffmtgtepz6quq3aje</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809120608/http://yinzhicao.org/CreditCard/SafePay.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/f7/99f7322c214e10853ed2ee3b952fdac8452728b0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cns.2015.7346825"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The Research of Autonomous In-orbit Health Management System for China's Manned Spacecrafts

Linhou Bai, Hong Yang, Ke Liang, W.H. Liao, J. Mo
<span title="">2019</span> <i title="EDP Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4vlgvitw6fcmbay5hkyo2s2ime" style="color: black;">MATEC Web of Conferences</a> </i> &nbsp;
By using various intelligent inference algorithms (such as physical model, neural network, data integration, fuzzy logic, expert system, etc.  ...  Considering the computer capability and design complexity, normally the system mainly includes the platform security related status that requires high realtime performance into the scope of autonomous  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/matecconf/201925701006">doi:10.1051/matecconf/201925701006</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xevrs6dfwzhu3khzexqtakzesi">fatcat:xevrs6dfwzhu3khzexqtakzesi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427023652/https://www.matec-conferences.org/articles/matecconf/pdf/2019/06/matecconf_pmae2018_01006.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/49/7749043466d2e5e36e99e06d8ac5be1f6de90b56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1051/matecconf/201925701006"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Hardware and Security [chapter]

Gedare Bloom, Eugen Leontie, Bhagirath Narahari, Rahul Simha
<span title="">2012</span> <i title="Elsevier"> Handbook on Securing Cyber-Physical Critical Infrastructure </i> &nbsp;
Even after hardware outlives its usefulness, we must dispose of it properly or risk attacks such as theft of the data or software still resident in the hardware.  ...  Memory Protection Security policies define how users of a computing system are allowed to use, modify, or share its resources.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-12-415815-3.00012-1">doi:10.1016/b978-0-12-415815-3.00012-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/usk6j5webjdytjmtjublkukjve">fatcat:usk6j5webjdytjmtjublkukjve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140309003731/http://www.seas.gwu.edu:80/~simha/research/HWSecBookChapter12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/bc/afbc0b8ef4ec57294a9cdcf43a17c4fbc5b206e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-12-415815-3.00012-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Design of IoT based Smart Home System

Monish Chandradhara, Dept of Mechanical Engineering, R.V. College of Engineering, Bangalore 560059., Ashlin George, Mohammed Faraaz, Aryan Saraf, Dept of Mechanical Engineering, R.V. College of Engineering, Bangalore 560059., Dept of Mechanical Engineering, R.V. College of Engineering, Bangalore 560059., Dept of Mechanical Engineering, R.V. College of Engineering, Bangalore 560059.
<span title="2021-12-13">2021</span> <i title="ADD Technologies"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ajkap75r2zh2zmbzmciolww4ru" style="color: black;">Journal of University of Shanghai for Science and Technology</a> </i> &nbsp;
The Internet of Things (IoT) is used to describe a network of physical objects which are connected to each other with the help of embedded sensors, transceivers and software code to communicate and share  ...  IoT devices are not only used in Homes but also in Industries where they can play a pivotal role in bringing down operating costs and helping companies make better business decisions to align their companies  ...  Thus, the speed of various devices using the WiFi internet connection increases as the computer approaches the main source, while the speed decreases as the computer moves away from the source.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.51201/jusst/21/121013">doi:10.51201/jusst/21/121013</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/352nar3synb3lcdk7v26akn7w4">fatcat:352nar3synb3lcdk7v26akn7w4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220226072434/https://jusst.org/wp-content/uploads/2021/12/Design-of-IoT-based-Smart-Home-System.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/8d/b58d4a5036119cb60f47f4f1f4ddf814e6e765bb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.51201/jusst/21/121013"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Quantum Fog Cloud Model In Internet Of Things With Analysis Of Green Computing

Sayantan Gupta
<span title="2017-01-31">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network.  ...  The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing.  ...  This requires a combination of physical security and cybersecurity.  Handle an unprecedented volume, variety, and velocity of data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.264026">doi:10.5281/zenodo.264026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ylwzy72xb5dx5aqzo5cpla4cam">fatcat:ylwzy72xb5dx5aqzo5cpla4cam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201222193639/https://zenodo.org/record/264026/files/20_IJRG17_A01_19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/31/cb31480c5366a6d48b41185c3c42fcbfa32e7ee3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.264026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud [article]

Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi
<span title="2020-10-05">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we survey industrial and academic deployment models of multi-tenant FPGAs in the cloud computing settings, and highlight their different adversary models and security guarantees, while shedding  ...  clients sharing physical resources with victim users.  ...  Several of these security threats, aside from ones that arise specifically from FPGA use, have their analogues in traditional cloud-based VM computing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.13914v2">arXiv:2009.13914v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mbdpjfuoljderjhopoppxkxkoe">fatcat:mbdpjfuoljderjhopoppxkxkoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201023103957/https://arxiv.org/pdf/2009.13914v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/96/81/9681c956b0ab2679f30cb700439251f103645aca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.13914v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

QUANTUM FOG CLOUD MODEL IN INTERNET OF THINGS WITH ANALYSIS OF GREEN COMPUTING

Sayantan Gupta
<span title="2017-01-31">2017</span> <i title="Granthaalayah Publications and Printers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qx6hbcdtdvhuhhez3nqqmbosza" style="color: black;">International journal of research - granthaalayah</a> </i> &nbsp;
So, our proposed Model the Fog-Things Model will help us to determine the security issues and indeed secure the entire IoT network.  ...  The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing.  ...  This requires a combination of physical security and cybersecurity.  Handle an unprecedented volume, variety, and velocity of data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29121/granthaalayah.v5.i1.2017.1886">doi:10.29121/granthaalayah.v5.i1.2017.1886</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ecnahjlxuzgkzn2cdd72oya3yi">fatcat:ecnahjlxuzgkzn2cdd72oya3yi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201024153147/https://www.granthaalayahpublication.org/journals/index.php/granthaalayah/article/download/IJRG17_A01_19/1766" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/6d/626de31f1c206120c9cf827afd6db9db1f05964c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.29121/granthaalayah.v5.i1.2017.1886"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]

Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia
<span title="">2016</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dsrvu6bllzai7oj3hktnc5yf4q" style="color: black;">Computer</a> </i> &nbsp;
His research interests include security issues in cyber-physical systems, mobile/ad hoc/sensor/cellular networks, social networks, storage systems, and anonymous communication systems.  ...  Commonly accepted procedures used to optimize a design for area, power, timing, and other parameters can also con ict with security principles.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2016.260">doi:10.1109/mc.2016.260</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xh5zdbab7zfqloewzdydb2jgju">fatcat:xh5zdbab7zfqloewzdydb2jgju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190228041039/http://pdfs.semanticscholar.org/9c06/4b7bf1a718066cf359dabf7c5c2739d0cc3d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9c/06/9c064b7bf1a718066cf359dabf7c5c2739d0cc3d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mc.2016.260"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Page 10 of Journal of Systems Management Vol. 23, Issue 10 [page]

<span title="">1972</span> <i title="John Carroll University, School of Business"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_journal-of-systems-management" style="color: black;">Journal of Systems Management </a> </i> &nbsp;
Both users and computer center personnel may be negligent. Sensitive punched cards and printouts not properly disposed of constitute a security breach.  ...  Computer operators, system programmers, and maintenance personnel have special privileges. Mis- use of these special privileges or errors by computer center personnel poses a special threat.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_journal-of-systems-management_1972-10_23_10/page/10" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_journal-of-systems-management_1972-10_23_10/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Automation of Ash Handling System with Event Logger
English

A.S Wadhawe, Rahul P Kurtadikar
<span title="2014-12-25">2014</span> <i title="Seventh Sense Research Group Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/iir5i5vb3jealaqt4oybz63t4y" style="color: black;">International Journal of Computer Trends and Technology</a> </i> &nbsp;
Embedded I/O and expansion I/O are used.1769 IQ 32 module used as digital input channels.1769 IQ 32 module having 32 digital input. Another module is OW16, it is digital output module.  ...  Main plant renovation is done in 2004 by using HF CONROL DCS but most of the subsystem was not renovated.  ...  The bottom ash collected in the slurry tank is removed by using slurry disposal pump. There are three slurry disposal pumps. The slurry disposal area is about 100 hectors where ash is dumped.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v18p150">doi:10.14445/22312803/ijctt-v18p150</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n22fuffkpvgwtkrd3lboqn6cje">fatcat:n22fuffkpvgwtkrd3lboqn6cje</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150323013826/http://www.ijcttjournal.org/Volume18/number-5/IJCTT-V18P150.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/ce/12ceb39ffc5d09888c9244100be732bc36da7917.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14445/22312803/ijctt-v18p150"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 15,893 results