Showing 1 - 20 results of 20 for search 'hardware security module', query time: 0.10s Refine Results
  1. 1
    “…The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption…”
    Get full text
    Get full text
    Get full text
  2. 2
  3. 3
    Subjects: “…TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices…”
    Get full text
    Get full text
    Get full text
    Get full text
  4. 4
    by Mubarak, Mohd Faizal
    Published 2010
    “… Platform Module (TPM) as a tamper proof hardware to protect the integrity of RFID system. The proposed…”
    Get full text
    Get full text
  5. 5
  6. 6
  7. 7
    by Mubarak, Mohd Faizal
    Published 2015
    “… security and privacy threats. In this thesis, we investigate how the integration and interconnection…”
    Get full text
    Get full text
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
    by Adnan, Lukman Hakim
    Published 2013
    “… to that is to use embedded microprocessors with built-in security module, which implements functions similar…”
    Get full text
    Get full text
  13. 13
    by Abd Razak, Muhammad Ab. Basith
    Published 2008
    “… types of wireless data transmission such as Frequency Modulation (FM), Amplitude Modulation (AM…”
    Get full text
    Get full text
  14. 14
    by Ibrahimy, Muhammad Ibn
    Published 2007
    “…The growth of the Internet as a vehicle for secure communication has resulted in Data Encryption…”
    Get full text
    Get full text
    Get full text
  15. 15
    by Khok, Jess Lyn
    Published 2010
    “…. The resultant hardware is two sets of identical cryptography wireless module which are able to perform both…”
    Get full text
    Get full text
  16. 16
    “… the need for human intervention, increase security and energy efficiency. It is still an open research due…”
    Get full text
    Get full text
    Get full text
  17. 17
  18. 18
    “… be integrated into an existing home appliances to reduce the need for human intervention, increase security…”
    Get full text
    Get full text
    Get full text
    Get full text
  19. 19
    by Salim, Sufya, Taha, Imad
    Published 2012
    “… in designing secure lightweight cryptographic modules is required. This paper meant to be a reference…”
    Get full text
    Get full text
    Get full text
  20. 20
Search Tools: RSS Feed Email Search