Sciweavers

1957 search results - page 69 / 392
» Embedded Processor Security
Sort
View
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 3 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
EMSOFT
2004
Springer
15 years 3 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
JDCTA
2010
172views more  JDCTA 2010»
14 years 4 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
PERCOM
2005
ACM
15 years 9 months ago
Sizzle: A standards-based end-to-end security architecture for the embedded Internet
Vipul Gupta, Michael Wurm, Yu Zhu, Matthew Millard...
IFIP
2007
Springer
15 years 4 months ago
A Reputation-Based Approach for Securing Vivaldi Embedding System
Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applic...
Damien Saucez, Benoit Donnet, Olivier Bonaventure