Sciweavers

3451 search results - page 35 / 691
» Security of Backup Data
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter
NSPW
2004
ACM
15 years 3 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
14 years 9 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
TIFS
2008
152views more  TIFS 2008»
14 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
BIRTHDAY
2008
Springer
14 years 11 months ago
Secure Data Flow in a Calculus for Context Awareness
Abstract. We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computin...
Doina Bucur, Mogens Nielsen