Sciweavers

1737 search results - page 242 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
ECRTS
2005
IEEE
15 years 10 months ago
Applying Static WCET Analysis to Automotive Communication Software
The number of embedded computers used in modern cars have increased dramatically during the last years, as they provide increased functionality to a reduced cost compared to previ...
Susanna Byhlin, Andreas Ermedahl, Jan Gustafsson, ...
ECBS
2005
IEEE
58views Hardware» more  ECBS 2005»
15 years 10 months ago
MoDeII: Modeling and Analyzing Time-Constraints
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
Jewgenij Botaschanjan, Jan Jürjens
ENTCS
2007
129views more  ENTCS 2007»
15 years 4 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
IFIP
2009
Springer
15 years 10 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
ESORICS
2004
Springer
15 years 9 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...