Sciweavers

3516 search results - page 110 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
WSC
2004
15 years 1 months ago
A Template-Based Conceptual Modeling Infrastructure for Simulation of Physical Security Systems
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Ashu Guru, Paul A. Savory
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 6 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
CCS
2007
ACM
15 years 3 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
JUCS
2008
143views more  JUCS 2008»
14 years 12 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
ASPDAC
2010
ACM
129views Hardware» more  ASPDAC 2010»
14 years 10 months ago
System-level development of embedded software
Abstract-- Embedded software plays an increasingly important role in implementing modern embedded systems. Development of embedded software, and of Hardware-dependent Software in p...
Gunar Schirner, Andreas Gerstlauer, Rainer Dö...