Sciweavers

249 search results - page 20 / 50
» A secure scan design methodology
Sort
View
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
SIGCSE
2005
ACM
240views Education» more  SIGCSE 2005»
14 years 1 months ago
A Java framework for experimentation with steganography
This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and...
Kenny Hunt
ITRUST
2005
Springer
14 years 1 months ago
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers ...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, A...
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
14 years 2 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
WSC
2004
13 years 9 months ago
A Template-Based Conceptual Modeling Infrastructure for Simulation of Physical Security Systems
Although simulation is one of the most innovative and cost-effective tools for modeling and analyzing a system, simulation studies often fail to provide any useful results. One re...
Ashu Guru, Paul A. Savory