Sciweavers

1957 search results - page 308 / 392
» Embedded Processor Security
Sort
View
ESAS
2006
Springer
15 years 8 months ago
On Optimality of Key Pre-distribution Schemes for Distributed Sensor Networks
We derive the optimality results for key pre distribution scheme for distributed sensor networks, and relations between interesting parameters. Namely, given a key-pool of size n ...
Subhas Kumar Ghosh
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 6 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
AMC
2007
134views more  AMC 2007»
15 years 5 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
IAJIT
2010
112views more  IAJIT 2010»
15 years 3 months ago
Variable Rate Steganography in Gray Scale Digital Images Using Neighborhood Pixel Information
: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Security has always been a major concern since time im...
Moazzam Hossain, Sadia Al Haque, Farhana Sharmin
OOPSLA
2010
Springer
15 years 3 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...