— Memory-intensive applications present unique challenges to an ASIC designer in terms of the choice of memory organization, memory size requirements, bandwidth and access latenc...
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Sensors in ubiquitous computing provide a new opportunity to extend existing RFID capabilities to situation-awareness. This paper proposes several alternatives of the Situation-Aw...
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...