Sciweavers

623 search results - page 49 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
135
Voted
SAFECOMP
1999
Springer
15 years 7 months ago
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems
Microprocessor-based systems are increasingly used to control safety-critical systems (e.g., air and railway traffic control, nuclear plant control, aircraft and car control). In t...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
164
Voted
USENIX
2004
15 years 5 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
GLOBECOM
2008
IEEE
15 years 10 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
137
Voted
WPES
2005
ACM
15 years 9 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
137
Voted
ESORICS
2009
Springer
15 years 10 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...