Sciweavers

1957 search results - page 170 / 392
» Embedded Processor Security
Sort
View
124
Voted
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Protocols for data-hiding based text document security and automatic processing
Text documents, in electronic and hardcopy forms, are and will probably remain the most widely used kind of content in our digital age. The goal of this paper is to overview proto...
Frédéric Deguillaume, Yuriy Rytsar, ...
ACSAC
2010
IEEE
14 years 8 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
146
Voted
EMSOFT
2005
Springer
15 years 10 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
EUROCRYPT
2007
Springer
15 years 11 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
197
Voted
ISI
2006
Springer
15 years 5 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...