Sciweavers

1737 search results - page 189 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
ICIP
2005
IEEE
16 years 6 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
CAV
1998
Springer
147views Hardware» more  CAV 1998»
15 years 8 months ago
Verification of an Implementation of Tomasulo's Algorithm by Compositional Model Checking
An implementation of an out-of-order processing unit based on Tomasulo's algorithm is formally verified using compositional model checking techniques. This demonstrates that f...
Kenneth L. McMillan
ICSEA
2006
IEEE
15 years 10 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
EUROPKI
2004
Springer
15 years 10 months ago
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
The use of PKI in large scale environments suffers some inherent problems concerning the options to adopt for the optimal cost-centered operation of the system. In this paper a Mar...
Agapios N. Platis, Costas Lambrinoudakis, Assimaki...
124
Voted
CSE
2009
IEEE
15 years 11 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...