Sciweavers

623 search results - page 36 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
128
Voted
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
15 years 2 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic
143
Voted
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
15 years 3 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
99
Voted
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 9 months ago
Power system on a chip (PSoC)
— This paper addresses modeling issues behind the development of a hardware analog emulator of power system behavior referred to as a Power System on a Chip (PSoC). The paper wil...
Chika O. Nwankpa, A. S. Deese, Qingyan Liu, Aaron ...
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 5 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
122
Voted
ITRUST
2005
Springer
15 years 9 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero