Sciweavers

1957 search results - page 292 / 392
» Embedded Processor Security
Sort
View
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
16 years 5 months ago
Exchanging Intensional XML Data
XML is becoming the universal format for data exchange between applications. Recently, the emergence of Web services as standard means of publishing and accessing data on the Web ...
Tova Milo, Serge Abiteboul, Bernd Amann, Omar Benj...
SAFECOMP
2007
Springer
15 years 11 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
ACSC
2006
IEEE
15 years 11 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
MDAI
2005
Springer
15 years 10 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...
122
Voted
FPL
2004
Springer
154views Hardware» more  FPL 2004»
15 years 10 months ago
High Performance True Random Number Generator in Altera Stratix FPLDs
Abstract. The paper presents a high performance True Random Number Generator (TRNG) embedded in Altera Stratix Field Programmable Logic Devices (FPLDs). As a source of randomness, ...
Viktor Fischer, Milos Drutarovský, Martin S...