Sciweavers

3516 search results - page 353 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ECOOP
2000
Springer
15 years 8 months ago
Design Patterns Application in UML
The Unified Modeling Language (UML) currently proposes a mechanism to model recurrent design structures: the parameterized collaborations. The main goal of this mechanism is to mo...
Gerson Sunyé, Alain Le Guennec, Jean-Marc J...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
15 years 10 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
CCS
2007
ACM
15 years 10 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
ICCAD
2007
IEEE
88views Hardware» more  ICCAD 2007»
16 years 1 months ago
Extending systems-on-chip to the third dimension: performance, cost and technological tradeoffs
Abstract—Because of the today’s market demand for highperformance, high-density portable hand-held applications, electronic system design technology has shifted the focus from ...
Roshan Weerasekera, Li-Rong Zheng, Dinesh Pamunuwa...
CAV
2010
Springer
227views Hardware» more  CAV 2010»
15 years 2 months ago
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
We describe Breach, a Matlab toolbox providing a coherent set of simulation-based techniques aimed at the analysis of deterministic models of hybrid dynamical systems. The primary ...
Alexandre Donzé