Sciweavers

713 search results - page 6 / 143
» An Integrated Framework for Security and Dependability
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 8 days ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
14 years 11 days ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
HOST
2008
IEEE
14 years 1 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
VLSID
2004
IEEE
168views VLSI» more  VLSID 2004»
14 years 7 months ago
VLSI Implementation of Visible Watermarking for a Secure Digital Still Camera Design
Watermarking is the process that embeds data called a watermark into a multimedia object for its copyright protection. The digital watermarks can be visible to a viewer on careful...
Saraju P. Mohanty, Nagarajan Ranganathan, Ravi Nam...
TPHOL
2008
IEEE
14 years 1 months ago
Formalizing a Framework for Dynamic Slicing of Program Dependence Graphs in Isabelle/HOL
Slicing is a widely-used technique with applications in e.g. compiler technology and software security. Thus verification of algorithms in these areas is often based on the correc...
Daniel Wasserrab, Andreas Lochbihler