Sciweavers

623 search results - page 47 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
125
Voted
ACSD
2007
IEEE
81views Hardware» more  ACSD 2007»
15 years 10 months ago
A model-driven design approach for mechatronic systems
The software design is one of the most challenging tasks during the design of a mechatronic system. On one hand, it has to provide solutions to deal with concurrency and timelines...
Jinfeng Huang, Jeroen Voeten, Marcel A. Groothuis,...
133
Voted
WINET
2002
101views more  WINET 2002»
15 years 3 months ago
SPINS: Security Protocols for Sensor Networks
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and u...
Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victo...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ISCA
2008
IEEE
134views Hardware» more  ISCA 2008»
15 years 10 months ago
Achieving Out-of-Order Performance with Almost In-Order Complexity
There is still much performance to be gained by out-of-order processors with wider issue widths. However, traditional methods of increasing issue width do not scale; that is, they...
Francis Tseng, Yale N. Patt
134
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner