Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Abstract. Model-Integrated Computing is a proven technology for designing and implementing complex software systems. Making the designtime models available at run-time benefits the...