Kurdziel et al., 2005 - Google Patents
An SCA security supplement compliant radio architectureKurdziel et al., 2005
- Document ID
- 6672130796338695095
- Author
- Kurdziel M
- Beane J
- Fitton J
- Publication year
- Publication venue
- MILCOM 2005-2005 IEEE Military Communications Conference
External Links
Snippet
This paper provides an overview of the security features and attributes presented in the software communications architecture (SCA) security supplement along with implementation recommendations. Hardware based security policy enforcement and flexible downloadable …
- 238000010586 diagram 0 description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11502845B2 (en) | Network interface device and method | |
US8225110B2 (en) | Cryptographic protection of usage restrictions in electronic devices | |
JP4912879B2 (en) | Security protection method for access to protected resources of processor | |
US9195806B1 (en) | Security server for configuring and programming secure microprocessors | |
US7299358B2 (en) | Indirect data protection using random key encryption | |
JP5860815B2 (en) | System and method for enforcing computer policy | |
CN107004083B (en) | Device key protection | |
US11868460B2 (en) | Authorized encryption | |
EP1320803A2 (en) | Embedded security device within a nonvolatile memory device | |
US10713392B2 (en) | Network interface device and method | |
Kent et al. | Assuring vehicle update integrity using asymmetric public key infrastructure (PKI) and public key cryptography (PKC) | |
CN116484379A (en) | System starting method, system comprising trusted computing base software, equipment and medium | |
Kurdziel et al. | An SCA security supplement compliant radio architecture | |
JP4321303B2 (en) | Program distribution system and in-vehicle gateway device | |
Wolf | Vehicular security mechanisms | |
CN119885191A (en) | Server firmware starting system based on distributed security modules | |
CN119316183A (en) | A method and device for application server security protection based on trusted computing | |
Noller | Security Target | |
Cosmo | Security Target Lite TachoDrive v4 on ID-One | |
EX6000 et al. | Non-Proprietary Security Policy | |
CARD | BULL TRUSTWAY PCI CRYPTOGRAPHIC CARD | |
Talmi et al. | NUVOTON TECHNOLOGY CORPORATION | |
Device et al. | COMMON CRITERIA SECURITY TARGET | |
Barker et al. | NIST DRAFT Special Publication 800-130 | |
Requiring | Protection Profile for Multilevel Operating Systems in Environments Requiring Medium Robustness |