Sciweavers

3516 search results - page 427 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
15 years 9 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
HOTI
2005
IEEE
15 years 10 months ago
A Scalable, Self-Routed, Terabit Capacity, Photonic Interconnection Network
We present SPINet (Scalable Photonic Integrated Network), an optical switching architecture particularly designed for photonic integration. The performance of SPINet-based network...
Assaf Shacham, Benjamin G. Lee, Keren Bergman
DAC
1998
ACM
16 years 5 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
EDOC
2006
IEEE
15 years 11 months ago
Requirements Traceability and Transformation Conformance in Model-Driven Development
The variety of design artefacts (models) produced in a model-driven design process results in an intricate relationship between requirements and the various models. This paper pro...
João Paulo A. Almeida, Pascal van Eck, Mari...
IACR
2011
221views more  IACR 2011»
14 years 4 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...