Sciweavers

11603 search results - page 76 / 2321
» Embedded System Security
Sort
View
ESORICS
2011
Springer
14 years 4 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
16 years 1 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
SEUS
2009
IEEE
15 years 11 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
DSD
2006
IEEE
109views Hardware» more  DSD 2006»
15 years 10 months ago
ATOMI II - Framework for Easy Building of Object-oriented Embedded Systems
Traditionally, an embedded system design process demands a considerable amount of expertise, time and money. This makes developing embedded systems difficult for many companies, a...
Tero Vallius, Juha Röning
IEICET
2008
147views more  IEICET 2008»
15 years 4 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...