Sciweavers

121 search results - page 11 / 25
» Software Protection through Anti-Debugging
Sort
View
103
Voted
SENSYS
2010
ACM
14 years 7 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...
TDSC
2011
14 years 4 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
78
Voted
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 1 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ICSE
2007
IEEE-ACM
15 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ADAEUROPE
2005
Springer
15 years 3 months ago
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks
: In previous papers we had presented an application program interface (API) that enabled applications to use application-defined scheduling algorithms for Ada tasks in a way compa...
Mario Aldea Rivas, Javier Miranda, Michael Gonz&aa...