Sciweavers

147 search results - page 12 / 30
» Secure Memory Accesses on Networks-on-Chip
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
14 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
ICAS
2005
IEEE
171views Robotics» more  ICAS 2005»
15 years 3 months ago
AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure
Access to Grid services is currently limited to devices having substantial computing, network and memory resources such as PCs. On the other hand, most of mobile devices do not ha...
Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han...
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
101
Voted
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
15 years 10 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
HIPEAC
2007
Springer
15 years 3 months ago
Compiler-Assisted Memory Encryption for Embedded Processors
A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of ...
Vijay Nagarajan, Rajiv Gupta, Arvind Krishnaswamy