Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Article(4)
Publisher
International Journal of Distributed Sensor Networks(1)
Journal of Semiconductor Technology and Science(1)
Security and Communication Networks(1)
WSEAS Transactions on Systems(1)
Área temáticas
Ciencias de la computación(3)
Física aplicada(2)
Programación informática, programas, datos, seguridad(2)
Fuerzas aéreas y otras fuerzas especializadas(1)
A security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDebug port protection mechanism for secure embedded devices
ArticleAbstract: In this paper we propose a protection mechanism for the debug port. While debug ports are useful tooPalabras claves:Authentication token, Debug port, Device hackingAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus