Sciweavers

183 search results - page 14 / 37
» Cryptosystem Designed for Embedded System Security
Sort
View
SEUS
2008
IEEE
15 years 6 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
ANTS
2004
Springer
103views Algorithms» more  ANTS 2004»
15 years 3 months ago
A Comparison of CEILIDH and XTR
We give a comparison of the performance of the recently proposed torus-based public key cryptosystem CEILIDH, and XTR. Underpinning both systems is the mathematics of the two dimen...
Robert Granger, Dan Page, Martijn Stam
ECBS
2011
IEEE
271views Hardware» more  ECBS 2011»
13 years 11 months ago
MoPED: A Model-Based Provisioning Engine for Dependability in Component-Based Distributed Real-Time Embedded Systems
—Developing dependable distributed real-time and embedded (DRE) systems incurs significant complexities in the tradeoffs resulting from the different conflicting attributes of ...
Sumant Tambe, Akshay Dabholkar, Aniruddha S. Gokha...
CODES
2005
IEEE
15 years 5 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
DAC
2009
ACM
16 years 20 days ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson