Sciweavers

1737 search results - page 35 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
133
Voted
DATE
2005
IEEE
133views Hardware» more  DATE 2005»
15 years 9 months ago
Locality-Aware Process Scheduling for Embedded MPSoCs
Utilizing on-chip caches in embedded multiprocessorsystem-on-a-chip (MPSoC) based systems is critical from both performance and power perspectives. While most of the prior work th...
Mahmut T. Kandemir, Guilin Chen
124
Voted
IASTEDSE
2004
15 years 5 months ago
Security and reliability challenges in component-based software for consumer devices
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...
Stefano Campadello, Ronan MacLaverty, Titos Sarida...
130
Voted
ICICS
2005
Springer
15 years 9 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
113
Voted
DATE
2005
IEEE
148views Hardware» more  DATE 2005»
15 years 9 months ago
A Dependability-Driven System-Level Design Approach for Embedded Systems
The objective of this paper is to introduce dependability as an optimization criterion in the system-level design process of embedded systems. Given the pervasiveness of embedded ...
Arshad Jhumka, Stephan Klaus, Sorin A. Huss
137
Voted
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 1 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...