Sciweavers

199 search results - page 5 / 40
» A system for a new two-dimensional code: Secure 2D code
Sort
View
VTC
2010
IEEE
153views Communications» more  VTC 2010»
13 years 5 months ago
H.264 Wireless Video Telephony Using Iteratively-Detected Binary Self-Concatenated Coding
— In this contribution we propose a robust H.264 coded wireless video transmission scheme using iteratively decoded self-concatenated convolutional coding (SECCC). The proposed S...
Nasruminallah, Muhammad Fasih Uddin Butt, Soon Xin...
CASES
2005
ACM
13 years 9 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICC
2007
IEEE
102views Communications» more  ICC 2007»
14 years 1 months ago
Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem
Abstract—In this paper, a new variant of the McEliece cryptosystem, based on Quasi-Cyclic Low-Density Parity-Check (QCLDPC) codes, is studied. In principle, such codes can substi...
Marco Baldi, Franco Chiaraluce, Roberto Garello, F...
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
13 years 11 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman
DIMVA
2010
13 years 8 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...