Sciweavers

1240 search results - page 107 / 248
» Trusted Design in FPGAs
Sort
View
FPL
2005
Springer
149views Hardware» more  FPL 2005»
15 years 3 months ago
Heterogeneity Exploration for Multiple 2D Filter Designs
Many image processing applications require fast convolution of an image with a set of large 2D filters. Field - Programmable Gate Arrays (FPGAs) are often used to achieve this go...
Christos-Savvas Bouganis, Peter Y. K. Cheung, Geor...
TRUST
2009
Springer
15 years 4 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
ICCBR
2007
Springer
15 years 4 months ago
Explanations and Case-Based Reasoning in Ambient Intelligent Systems
Interacting with intelligent systems in general and ambient intelligent systems in particular, requires that these systems have the ability to build a trust relationship with the u...
Jörg Cassens, Anders Kofod-Petersen
TGC
2005
Springer
15 years 3 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 10 months ago
Steganographic Routing in Multi Agent System Environment
: In this paper we present an idea of trusted communication platform for Multi-Agent Systems (MAS) called TrustMAS. Based on analysis of routing protocols suitable for MAS we have ...
Krzysztof Szczypiorski, Igor Margasinski, Wojciech...