Sciweavers

1737 search results - page 109 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
JUCS
2010
159views more  JUCS 2010»
14 years 10 months ago
Developing a Secure Mobile Grid System through a UML Extension
: The idea of developing software through systematic development processes to improve software quality is not new. Nevertheless, there are still many information systems such as th...
David G. Rosado, Eduardo Fernández-Medina, ...
ACSAC
2006
IEEE
15 years 10 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
AFRICACRYPT
2009
Springer
15 years 1 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
133
Voted
ACSD
2006
IEEE
90views Hardware» more  ACSD 2006»
15 years 7 months ago
Simulation and Verification of Asynchronous Systems by means of a Synchronous Model
Synchrony and asynchrony are commonly opposed to each other. Now, in embedded applications, actual solutions are often situated in between, with synchronous processes composed in ...
Nicolas Halbwachs, Louis Mandel
ESORICS
2000
Springer
15 years 7 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer