[PDF][PDF] Critical Infrastructures

A Carelli - 2022 - core.ac.uk
The growing threat of advanced cyber-attacks is a major cause of concerns for Information-
Technology (IT) systems. Cybersecurity implies guaranteeing the security of the cyberspace …

Method and apparatus for securing configuration scan chains of a programmable device

AS Doshi, BB Pedersen - US Patent 9,026,873, 2015 - Google Patents
6, 1993 11, 1993 11, 1993 9, 1994 12, 1994 2, 1995 9, 1995 12, 1995 4, 1996 8, 1996 10,
1996 12, 1996 6, 1997 6, 1998 6, 1999 1, 2001 8, 2005 11/2005 6, 2006 1/2007 11/2007 3 …

Securing Soft IP Cores in FPGA based Reconfigurable Mobile Heterogeneous Systems

A Carelli, C Basile, A Savino, A Vallero… - arXiv preprint arXiv …, 2019 - arxiv.org
The mobile application market is rapidly growing and changing, offering always brand new
software to install in increasingly powerful devices. Mobile devices become pervasive and …

[PDF][PDF] Securing embedded digital systems for in-field applications

M Barbareschi - 2014 - fedoa.unina.it
Some of the research and results described in this Ph. D. thesis has undergone peer review
and has been published in, or at the date of this printing is being considered for publication …

[PDF][PDF] Securing Critical Infrastructures

A Carelli - 2020 - tesidottorato.depositolegale.it
The growing threat of advanced cyber-attacks is a major cause of concerns for Information-
Technology (IT) systems. Cybersecurity implies guaranteeing the security of the cyberspace …

A Secure Protocol to Exchange Security Key for Updating Partially Reconfigurable Embedded System

T Thanh, TH Vũ, NV Cường, PN Nam - Tạp chí Khoa học và Công nghệ …, 2014 - jst-ud.vn
Tóm tắt To ensure the data confidentiality and availability, a symmetric key, called secret
key, must be exchanged securely between parties for encrypting data before beginning a …