Search Results - "hardware security"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
  2. 2
  3. 3

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…This cryptosystem can be used in wide range of electronic devices, which include PCs, PDAs, wireless handsets, smart cards, hardware security modules, network appliances, such as routers, gateways, firewalls, storage and web servers. …”
    Get full text
    Get full text
  4. 4

    Assessing information security management in Malaysian academic libraries / Roesnita binti Ismail by Ismail, Roesnita

    Published 2012
    “…Findings revealed that hardware security threats (70.0%), human-related threats (66.0%) and environmental threats (51.0%) were perceived as the most common information security threats in Malaysian academic libraries. …”
    Get full text
    Get full text
  5. 5

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…In addition, the cloud environment is complex, highly uncertain with chances of failures at all levels (human, software, hardware, security). Therefore, one of the major concerns of users is getting assurance of the needed QoS for their applications, especially in tight cases. …”
    Get full text
    Get full text