Global Sources
EE Times-Asia
Stay in touch with EE Times Asia
EE Times-Asia > Advanced Search > physical hardware security

physical hardware security Search results

?
?
total search143 articles
2008-07-01 Hardware secures standards
With global competition growing in ferocity, standards of conduct getting looser, and the manufacturing supply chain operating in countries with weak intellectual-property protection, what's the best way to safeguard the security keys integral to standards-based security schemes for everything from HDTV to iPods
2004-10-18 Seeking security at the network edge
By moving the management of security services to the network edge, many technical and business challenges can be solved
2013-03-26 Protect data with hardware AES engines
Know how the MAX36025 DeepCover tamper-reactive cryptographic-node controller enables physical tamper protection
2012-11-05 Address power, security issues with antifuse tech
Learn how to resolve the new constraints of battery-powered system-on-chip design.
2005-07-01 VMs tighten up PC security
Virtual machines can bridge the gap between data protection and usability.
2014-09-04 Thwarting IoT security threats with ARM TrustZone
Virtualisation can be leveraged to enable consolidation of connected devices, and ARM TrustZone can be utilised to tackle security threats to the Internet of Things
2007-11-14 Security solution boasts fast, easy integration
Atmel's latest security solution offers a wide choice of interfaces, allowing fast and easy physical integration in any existing system
2011-02-23 Security microchip self destructs
Xelltec's patent-pending microchip allows users to copy data from a stolen laptop, smart phone, or other mobile device to a server, then destroy the data and disable the device.
2004-06-16 Security co-processor ties to PCI Express
Will security accelerator interconnects evolve from the dominant PCI and PCI-X of today to PCI Express tomorrow
2002-12-02 Open source hardware
This technical article discusses how open-source techniques in hardware design are still impossible to achieve with the current technology available to engineers
2011-05-27 NXP, Intrinsic-ID team up for security solution
NXP and Intrinsic-ID announced a collaborative agreement to deploy a hardware intrinsic security (HIS) solution in NXP's next SmartMX security chip technology
2003-09-04 NEC upgrades gateway processor to handle security tasks
Setting its sights on network gateways, NEC Electronics America Inc. has rolled out a faster version of its 64-bit embedded processor.
2011-01-11 LEPs with 'au10tic' security IC combat counterfeit components
NXP and LUXIM collaborate on efficient LEP street lights with 'au10tic' security IC to ensure genuine street lighting components
2002-04-30 Infineon security controller provides USB interface
Infineon Technologies AG has announced the release of the SLE66CUX640P USBsec security microcontroller that integrates a USB interface, providing public key cryptography, secure network log-on, and e-commerce transaction authentication for USB-enabled cards and USB dongles
2004-07-15 Infineon chip card controllers provide foolproof security
Infineon announced that it will be offering new chip card controllers for improved security of electronic identity cards and passports
2007-02-09 Flash memory-based security rolls for handsets
To address growing wireless requirements for more robust security, Spansion is sampling what it claims is the first flash memory subsystem that provides security protection from viruses, attacks and service thefts on handsets
2007-05-14 Establishing mobile security
Every company in the mobile technology community should start considering how to proceed to take advantage of the MTM specification and to implement improved security in their next-generation products
2007-02-01 Ensure strong security in mobile transactions
Mobile handsets are being looked to increasingly act as transactional mechanisms. But before we reach that point of complete convergence, there is the issue of security that needs to be addressed first
2012-07-03 Enhancing embedded OS security
Here are some security best practices that embedded system developers need to consider in their designs
2003-04-01 DVR, biometrics lead the security industry
The article will focus on the physical aspect of security, particularly digital video recorders, which has a high growth potential
2012-05-02 Dialog to use Intrinsic-ID on-chip security
Dialog is using the Intrinsic-ID technology to ensure that only authenticated software can run on the SC14453S platform.
2015-12-15 Designing security framework for IoT devices
To secure IoT devices, designers need a comprehensive security framework that provides enterprise-level security in these small devices. Find out how this can be achieved
2006-02-16 Balancing cost vs. security for embedded design
Extraordinary cost reductions that wireless brings to MCU-based applications offset the price of security technology
2015-10-08 Addressing security risks in the IoT age
Learn about the need to apply known security techniques to a new environment that operates under a set of additional constraints
2004-10-18 Trusted platform modules eye embedded
TPMs implement trusted-computing security objectives in a low-power, high-performance hardware/software combination
2015-04-02 Secure encryption systems against side-channel attacks
Vendors must now look into the process of designing and testing to guard their systems against side-channel attacks. This process begins with understanding how such threats operate.
2004-06-16 Quantum encryption secures crypto war
Quantum-key distribution provides continuous key regeneration that enhances the security of the communications channel
2005-09-16 Make right choices when building Zigbee apps
Increase your Zigbee's performance without encountering drawbacks in your design platforms.
2007-10-16 M-Commerce calls for secure platform
This article discusses security measures for M-Commerce using mobile phones via an RF subsystem to authenticate a transaction
2015-06-08 EnSilica delivers multi-core processor for wireless needs
The eSI-32X0MP can be used to implement physical layer processing and run an advanced protocol stack. It can beconfigured with an unlimited number of processors depending on the application
Bloggers Say

Bloggers Say

See what engineers like you are posting on our pages.

?
?
Back to Top