Sciweavers

623 search results - page 46 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
SIGMOD
1998
ACM
89views Database» more  SIGMOD 1998»
15 years 7 months ago
Secure and Portable Database Extensibility
The functionality of extensible database servers can be augmented by user-de ned functions UDFs. However, the server's security and stability are concerns whenever new code...
Michael W. Godfrey, Tobias Mayr, Praveen Seshadri,...
150
Voted
MOBISYS
2008
ACM
15 years 5 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
152
Voted
WISEC
2009
ACM
15 years 10 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
117
Voted
IPPS
2006
IEEE
15 years 9 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
132
Voted
ISSS
1995
IEEE
117views Hardware» more  ISSS 1995»
15 years 7 months ago
Scheduling and resource binding for low power
Decisions taken at the earliest steps of the design process may have a significantimpact on the characteristics of the final implementation. This paper illustrates how power con...
Enric Musoll, Jordi Cortadella