Sciweavers

Share
19 search results - page 1 / 4
» Aspects of the Development of Secure and Fault-Resistant Har...
Sort
View
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
8 years 9 months ago
Using Aspects to Design a Secure System
Developers of complex systems have to address concerns such as security, availability of services, and timeliness that often are non-orthogonal to traditional design structures, t...
Geri Georg, Indrakshi Ray, Robert B. France
HOST
2008
IEEE
8 years 10 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
AICCSA
2008
IEEE
254views Hardware» more  AICCSA 2008»
8 years 6 months ago
Integrating software development security activities with agile methodologies
Because of several vulnerabilities in software products and high amount of damage caused by them, software developers are enforced to produce more secure systems. Software grows u...
Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi
CCS
2011
ACM
7 years 4 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
books