Sciweavers

2486 search results - page 120 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
DAC
2010
ACM
14 years 16 days ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
JCAL
2002
105views more  JCAL 2002»
13 years 8 months ago
Conceptualising work activity for CAL systems design
As computing technology has increasingly become relevant to people's everyday lives, emphasis is being placed on ensuring Computer Assisted Learning (CAL) tools support users ...
D. Mwanza
DAC
2009
ACM
14 years 3 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
NCA
2006
IEEE
14 years 2 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller