Sciweavers

1957 search results - page 309 / 392
» Embedded Processor Security
Sort
View
USS
2010
15 years 2 months ago
PrETP: Privacy-Preserving Electronic Toll Pricing
Current Electronic Toll Pricing (ETP) implementations rely on on-board units sending fine-grained location data to the service provider. We present , a privacy-preserving ETP syst...
Josep Balasch, Alfredo Rial, Carmela Troncoso, Bar...
JDCTA
2010
125views more  JDCTA 2010»
14 years 11 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
IEEEPACT
2006
IEEE
15 years 10 months ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...
ASPLOS
2006
ACM
15 years 10 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 10 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....