Sciweavers

1209 search results - page 18 / 242
» Security as a new dimension in embedded system design
Sort
View
79
Voted
DT
2000
101views more  DT 2000»
14 years 9 months ago
Conflicting Criteria in Embedded System Design
The design of complex embedded systems involves the simultaneous optimization of several often competing objectives. Instead of a single optimal design, there is rather a set of a...
Michael Eisenring, Lothar Thiele, Eckart Zitzler
CODES
2003
IEEE
15 years 3 months ago
Design optimization of mixed time/event-triggered distributed embedded systems
Distributed embedded systems implemented with mixed, eventtriggered and time-triggered task sets, which communicate over bus protocols consisting of both static and dynamic phases...
Traian Pop, Petru Eles, Zebo Peng
98
Voted
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 6 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
MVA
1998
117views Computer Vision» more  MVA 1998»
14 years 9 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
JCM
2007
101views more  JCM 2007»
14 years 9 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan