Sciweavers

3516 search results - page 371 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
IEEESCC
2005
IEEE
15 years 10 months ago
An ECA Rule-based Workflow Design Tool for Shanghai Grid
Service integration, the ultimate goal of Shanghai Grid, has created a necessity for more efficient and effective workflow infrastructure. Workflow design tool is one core compone...
Lin Chen, Minglu Li, Jian Cao, Yi Wang
160
Voted
FORTE
2003
15 years 6 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
140
Voted
IISWC
2006
IEEE
15 years 10 months ago
Performance Cloning: A Technique for Disseminating Proprietary Applications as Benchmarks
Many embedded real world applications are intellectual property, and vendors hesitate to share these proprietary applications with computer architects and designers. This poses a ...
Ajay Joshi, Lieven Eeckhout, Robert H. Bell Jr., L...
IJNSEC
2007
82views more  IJNSEC 2007»
15 years 4 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
WCNC
2010
IEEE
15 years 8 months ago
Prioritized Resource Sharing in WiMax and WiFi Integrated Networks
Abstract—In order to ensure fair access and efficiency of bandwidth usage in wireless integrated networks, resource allocation algorithms should be well designed. In this paper,...
Nirmal Andrews, Yogesh Reddy Kondareddy, Prathima ...