Sciweavers

11603 search results - page 70 / 2321
» Embedded System Security
Sort
View
115
Voted
DATE
2007
IEEE
114views Hardware» more  DATE 2007»
15 years 11 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
137
Voted
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
IJNSEC
2008
112views more  IJNSEC 2008»
15 years 4 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
191
Voted
BIRTHDAY
2012
Springer
14 years 11 days ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova
IWSAS
2000
Springer
15 years 8 months ago
Model-Integrated Embedded Systems
Abstract. Model-Integrated Computing is a proven technology for designing and implementing complex software systems. Making the designtime models available at run-time benefits the...
Ákos Lédeczi, Arpad Bakay, Miklos Ma...