Sciweavers

1737 search results - page 265 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
134
Voted
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 9 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
RTAS
2007
IEEE
15 years 10 months ago
Soft Real-Time Scheduling on Performance Asymmetric Multicore Platforms
This paper discusses an approach for supporting soft realtime periodic tasks in Linux on performance asymmetric multicore platforms (AMPs). Such architectures consist of a large n...
John M. Calandrino, Dan P. Baumberger, Tong Li, Sc...
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 10 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
ISCA
2008
IEEE
112views Hardware» more  ISCA 2008»
15 years 10 months ago
Parallelism-Aware Batch Scheduling: Enhancing both Performance and Fairness of Shared DRAM Systems
In a chip-multiprocessor (CMP) system, the DRAM system is shared among cores. In a shared DRAM system, requests from a thread can not only delay requests from other threads by cau...
Onur Mutlu, Thomas Moscibroda