Sciweavers

1209 search results - page 15 / 242
» Security as a new dimension in embedded system design
Sort
View
DRM
2003
Springer
15 years 2 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
CISIS
2009
IEEE
15 years 4 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
ICESS
2004
Springer
15 years 3 months ago
A New Approach for Predictable Hard Real-Time Transaction Processing in Embedded Database
Real-time transaction processing becomes concerns as embedded time coming rapidly. However, the transaction process in real-time embedded system still has some problems in resource...
Tianzhou Chen, Yi Lian, Jiangwei Huang
ICCAD
2010
IEEE
119views Hardware» more  ICCAD 2010»
14 years 7 months ago
Symbolic system level reliability analysis
Abstract--More and more embedded systems provide a multitude of services, implemented by a large number of networked hardware components. In early design phases, dimensioning such ...
Michael Glaß, Martin Lukasiewycz, Felix Reim...
DAC
2005
ACM
14 years 11 months ago
A watermarking system for IP protection by a post layout incremental router
In this paper, we introduce a new watermarking system for IP protection on post-layout design phase. Firstly the copyright is encrypted by DES (Data Encryption Standard) and then ...
Tingyuan Nie, Tomoo Kisaka, Masahiko Toyonaga