Sciweavers

24529 search results - page 300 / 4906
» Computing on Authenticated Data
Sort
View
TC
2008
15 years 3 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
147
Voted
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
15 years 1 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
ICIP
2010
IEEE
15 years 1 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...

Publication
185views
17 years 2 months ago
Computer Networking in the People's Republic of China: A Trip Report
The authors were part of an eighteen-member international delegation of data communications professionals that recently visited the People's Republic of China. This report on ...
R. Jain and R. L. Pickholtz,
105
Voted
PDCAT
2004
Springer
15 years 9 months ago
Locabus: A Kernel to Kernel Communication Channel for Cluster Computing
Abstract. This paper proposes a kernel to kernel communication system for use in cluster computers. It is implemented directly on the Ethernet data link layer. This allows use of E...
Paul Werstein, Mark Pethick, Zhiyi Huang