Sciweavers

623 search results - page 35 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
CBSE
2005
Springer
15 years 9 months ago
Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models
We consider a class of component-based software models with interaction style of buffered asynchronous message passing between components with ports, represented by UML-RT. After ...
Zonghua Gu, Zhimin He
157
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Towards an Understanding of Security Concerns within Communities
—This paper documents some of the socio-technical issues involved in developing security measures for a community environment, looking at the users of a wireless mesh network dep...
Sara Bury, Johnathan Ishmael, Nicholas J. P. Race,...
174
Voted
TRUSTBUS
2007
Springer
15 years 9 months ago
Securing VO Management
Abstract. In this paper we propose a security architecture and mechanism for Virtual Organizations (VO) for businesses. The VOs we consider are based on web service technology to a...
Florian Kerschbaum, Rafael Deitos, Philip Robinson
CODES
2007
IEEE
15 years 9 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont
107
Voted
CARDIS
2000
Springer
110views Hardware» more  CARDIS 2000»
15 years 7 months ago
Biometrics, Access Control, Smart Cards: A not so Simple Combination
Although biometrics can be an useful component for access control, the security they procure is often overestimated, as if they were a magic tool whose simple use will automatical...
Gaël Hachez, François Koeune, Jean-Jac...