Sciweavers

184 search results - page 10 / 37
» Secure Software Delivery and Installation in Embedded System...
Sort
View
CASES
2010
ACM
14 years 7 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 3 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
ACMICEC
2006
ACM
150views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
A framework for managing optimization models for supply chain software agents
As third party logistic services become popular, the role of software agents increases in importance in terms of the logistics scheduling of buyers and sellers. To support many mo...
Jae Kyu Lee, Yong Sik Chang
62
Voted
DSOM
2003
Springer
15 years 2 months ago
A Self-Configuring Sensing System for Data Centers
State of the art data centers use wired sensors embedded in equipment for thermal monitoring. The high cost of sensor installation restricts equipment relocation. We propose using...
Malena R. Mesarina, Cyril Brignone, Tim Connors, M...