Presented on April 21, 2017 at 12:00 p.m. in the Klaus Advanced Computing Building, room 1116W.Dr. Jim Plusquellic is a professor of electrical and computer engineering at the University of New Mexico, chief technology officer for Enthentica Inc., and president and chief executive officer for Trusted and Secure Systems. His research interests are in the area of nano-scale VLSI and include security and trust in IC hardware, embedded system design, supply chain and IoT security and trust, silicon validation, design for manufacturability and delay test methods.Runtime: 63:54 minutesNew hardware architectures for Internet-of-Things (IoT) are emerging rapidly in response to con- sumer demands for improved situational awareness, instant access t...
International audienceToday, life is becoming increasingly connected. From TVs to smartphones, inclu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract—The IoT also have many applications in commercial sectors, such as environmental monitoring...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities ...
The Internet of Things (IoT) represents a great opportunity to connect people, information, and thin...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
International audienceToday, life is becoming increasingly connected. From TVs to smartphones, inclu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract—The IoT also have many applications in commercial sectors, such as environmental monitoring...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Internet of Things (IoT) is a revolutionary network that is envisioned to connect physical entities ...
The Internet of Things (IoT) represents a great opportunity to connect people, information, and thin...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
International audienceToday, life is becoming increasingly connected. From TVs to smartphones, inclu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract—The IoT also have many applications in commercial sectors, such as environmental monitoring...