Sciweavers

1737 search results - page 69 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
160
Voted
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 10 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
133
Voted
IACR
2011
137views more  IACR 2011»
14 years 3 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
135
Voted
ETFA
2008
IEEE
15 years 10 months ago
Pinpointing interrupts in embedded real-time systems using context checksums
When trying to track down bugs using cyclic debugging, the ability to correctly reproduce executions is imperative. In sequential, deterministic, non-real-time software, this repr...
Daniel Sundmark, Henrik Thane
153
Voted
MSE
2005
IEEE
148views Hardware» more  MSE 2005»
15 years 9 months ago
Teaching System-Level Design Using SpecC and SystemC
System-level design of embedded computer systems is essential to manage complexity and enhance designer productivity. Viewing designs at t abstraction levels allows developers to ...
Robert D. Walstrom, Joseph Schneider, Diane T. Rov...
162
Voted
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
15 years 9 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian