Sciweavers

2945 search results - page 13 / 589
» Designing and Implementing Malicious Hardware
Sort
View
RECONFIG
2008
IEEE
225views VLSI» more  RECONFIG 2008»
15 years 6 months ago
A Hardware Filesystem Implementation for High-Speed Secondary Storage
Platform FPGAs are capable of hosting entire Linuxbased systems including standard peripherals, integrated network interface cards and even disk controllers on a single chip. File...
Ashwin A. Mendon, Ron Sass
75
Voted
FPL
2004
Springer
74views Hardware» more  FPL 2004»
15 years 5 months ago
Hardware/Software Implementation of FPGA-Targeted Matrix-Oriented SAT Solvers
The paper describes two methods for the design of matrix-oriented SAT solvers based on data compression. The first one provides matrix compression in a host computer and decompress...
Valery Sklyarov, Iouliia Skliarova, Bruno Figueire...
ACSAC
2001
IEEE
15 years 3 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
92
Voted
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 5 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
ICMCS
2006
IEEE
117views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Data Hiding for Speech Bandwidth Extension and its Hardware Implementation
Most of the current speech transmission systems are only able to deliver speech signals in a narrow frequency band. This narrowband speech is characterized by a thin and muffled ...
Fan Wu, Siyue Chen, Henry Leung