Sciweavers

184 search results - page 14 / 37
» Secure Software Delivery and Installation in Embedded System...
Sort
View
DAC
2005
ACM
16 years 5 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
PADS
2009
ACM
15 years 10 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
EGICE
2006
15 years 7 months ago
Wireless Sensing, Actuation and Control - With Applications to Civil Structures
Structural monitoring and control have been subjects of interests in structural engineering for quite some time. Structural sensing and control technologies can benefit in terms of...
Yang Wang 0013, Jerome P. Lynch, Kincho H. Law
CASES
2004
ACM
15 years 9 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
TCOS
2010
14 years 10 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin