Sciweavers

1957 search results - page 47 / 392
» Embedded Processor Security
Sort
View
CSREAESA
2008
14 years 11 months ago
Security Observance throughout the Life-Cycle of Embedded Systems
- Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies through...
S. Hasan Mirjalili, Arjen K. Lenstra
ESORICS
2010
Springer
14 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
IPPS
2006
IEEE
15 years 3 months ago
Securing embedded programmable gate arrays in secure circuits
The purpose of this article is to propose a survey of possible approaches for implementing embedded reconfigurable gate arrays into secure circuits. A standard secure interfacing ...
Nicolas Valette, Lionel Torres, Gilles Sassatelli,...
ASPDAC
2005
ACM
72views Hardware» more  ASPDAC 2005»
14 years 11 months ago
TERPS: the embedded reliable processing system
Abstract — TERPS is a fault-tolerant computer design that significantly reduces the threat of electromagnetic interference (EMI), using hardware checkpoint/rollback-recovery. TE...
Hongxia Wang, Samuel Rodríguez, Cagdas Diri...
WISES
2003
14 years 11 months ago
Using a Java Optimized Processor in a Real World Application
— Java, a popular programming language on desktop systems, is rarely used in embedded systems. Some features of Java, like thread support in the language, could greatly simplify ...
Martin Schoeberl