Sciweavers

3516 search results - page 425 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DATE
2003
IEEE
108views Hardware» more  DATE 2003»
15 years 10 months ago
System-Level Power Analysis Methodology Applied to the AMBA AHB Bus
The specification on power consumption of a digital system is extremely important due to the growing relevance of the market of portable devices and must be taken into account sin...
Marco Caldari, Massimo Conti, Massimo Coppola, Pao...
SACMAT
2009
ACM
15 years 11 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ASIACRYPT
2003
Springer
15 years 10 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
ISMAR
2002
IEEE
15 years 9 months ago
Augmented Urban Planning Workbench: Overlaying Drawings, Physical Models and Digital Simulation
There is a problem in the spatial and temporal separation between the varying forms of representation used in urban design. Sketches, physical models, and more recently computatio...
Hiroshi Ishii, Eran Ben-Joseph, John Underkoffler,...
COOPIS
1998
IEEE
15 years 9 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel