Sciweavers

1209 search results - page 97 / 242
» Security as a new dimension in embedded system design
Sort
View
RECONFIG
2009
IEEE
182views VLSI» more  RECONFIG 2009»
15 years 4 months ago
Scalability Studies of the BLASTn Scan and Ungapped Extension Functions
BLASTn is a ubiquitous tool used for large scale DNA analysis. Detailed profiling tests reveal that the most computationally intensive sections of the BLASTn algorithm are the sc...
Siddhartha Datta, Ron Sass
GRAPHICSINTERFACE
2000
14 years 11 months ago
Are We All In the Same "Bloat"?
"Bloat", a term that has existed in the technical community for many years, has recently received attention in the popular press. The term has a negative connotation imp...
Joanna McGrenere, Gale Moore
IDTRUST
2010
ACM
14 years 8 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
CCS
2007
ACM
15 years 4 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
LCTRTS
2009
Springer
15 years 4 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many benefits, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...