Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,922,535 papers from all fields of science
Search
Sign In
Create Free Account
Hardware security module
Known as:
Hardware secure module
, Host Security Module
, HSM
Expand
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Application programming interface
Certificate policy
Code signing
Common Criteria
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Key Management through Delegation for LoRaWAN based Healthcare Monitoring Systems
Tahsin C. M. Dönmez
,
E. Nigussie
International Symposium on Medical Information…
2019
Corpus ID: 195697626
We present a key management scheme, Assisted Mode, for improving security of LoRaWAN. LoRaWAN stores lifetime root keys in end…
Expand
2014
2014
A secure channel establishment method on a hardware security module
Daewon Kim
,
YongSung Jeon
,
Jeongnyeo Kim
Information and Communication Technology…
2014
Corpus ID: 14018837
In various computing environments, hardware security modules are needed for protecting cryptographic keys and security services…
Expand
2014
2014
Study on Cryptography as a Service (CAAS)
R. Paper
,
Yudi Prayudi
,
T. K. Priyambodo
2014
Corpus ID: 212521691
— Cloud is a solution that is offered to improve efficiency and service. Cryptography as a Service ( CAAS ) is included in one of…
Expand
2014
2014
Mobile hardware security
V. Chandra
,
R. Aitken
IEEE Hot Chips Symposium
2014
Corpus ID: 10467846
2013
2013
Efficient management of security and privacy issues in mobile cloud environment
D. Jana
,
D. Bandyopadhyay
IEEE India Conference
2013
Corpus ID: 7375919
Mobile cloud computing is becoming more and more popular among mobile users and developers who can see a direct benefit to…
Expand
2012
2012
A hardware security module for quadrotor communication
Abdulhadi Shoufan
International Conference on Field-Programmable…
2012
Corpus ID: 35274866
This paper presents a hardware architecture for secure quadrotor communication. Both, the control data sent by the ground station…
Expand
Review
2009
Review
2009
Ceremonies Design for PKI's Hardware Security Modules
J. E. Martina
,
Tulio de Souza
,
Ricardo Felipe Custódio
Anais do IX Simpósio Brasileiro de Segurança da…
2009
Corpus ID: 31156417
Ceremonies are a useful tool to HSMs in PKI environments. They state operational procedures and usage scenarios. Their correct…
Expand
2009
2009
Electronic Voting Using Identity Domain Separation and Hardware Security Modules
T. Rössler
Int. J. E Adopt.
2009
Corpus ID: 14403597
E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of…
Expand
2007
2007
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
J. E. Martina
,
Tulio de Souza
,
Ricardo Felipe Custódio
European Public Key Infrastructure Workshop
2007
Corpus ID: 40699242
The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential…
Expand
2005
2005
E-voting: a scalable approach using XML and hardware security modules
T. Rössler
,
H. Leitold
,
R. Posch
International Conference on E-Learning, E…
2005
Corpus ID: 30174655
E-voting increasingly gains interest in e-democracy and e-government movements. Not only the security and the availability of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE