Sciweavers

2213 search results - page 185 / 443
» Software Security
Sort
View
140
Voted
WCRE
2005
IEEE
15 years 9 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
107
Voted
OZCHI
2005
ACM
15 years 9 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
146
Voted
LCPC
2004
Springer
15 years 9 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...
103
Voted
HOTOS
2003
IEEE
15 years 9 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
127
Voted
ICRA
2003
IEEE
148views Robotics» more  ICRA 2003»
15 years 9 months ago
Designing a secure and robust mobile interacting robot for the long term
This paper presents the genesis of RoboX. This tour guide robot has been built from the scratch based on the experience of the Autonomous Systems Lab. The production of 11 of thos...
Nicola Tomatis, Gregoire Terrien, Ralph Piguet, Da...