Sciweavers

1028 search results - page 88 / 103
» Using Attack Graphs to Design Systems
Sort
View
138 views 116 votes 15 years 6 months ago  DSD 2003»
Network on Chip (NoC) is a new paradigm for designing core based System on Chip which supports high degree of reusability and is scalable. In this paper we describe an efficient t...
95 views 100 votes 15 years 1 months ago  CACM 2006»
ional thinking is using abstraction and decomposition when attacking a large complex task or designing a large complex system. It is separation of concerns. It is choosing an appro...
165 views 149 votes 15 years 5 months ago  GD 1998»
We demonstrate the H3Viewer graph drawing library, which can be run from a standalone program or in conjunction with other programs such as SGI's Site Manager application. Our...
129 views 100 votes 15 years 7 months ago  ISCAS 2008»
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
98 views 104 votes 15 years 6 months ago  EUROPKI 2004»
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
160 views 120 votes 15 years 2 months ago  MEDIAFORENSICS 2010»
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
178 views 106 votes 15 years 5 months ago  SP 2010»
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
91 views 140 votes 15 years 1 months ago  CTW 2002»
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
138 views 110 votes 16 years 2 months ago  DAC 2001»
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
173 views 143 votes 15 years 6 months ago  SAMOS 2004»
The dataflow interchange format (DIF) is a textual language that is geared towards capturing the semantics of graphical design tools for DSP system design. A key objective of DIF i...