Sciweavers

2108 search results - page 333 / 422
» Encrypted
Sort
View
OZCHI
2006
ACM
15 years 8 months ago
A wearable folding display for self-expression
This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic...
Andrew Vande Moere, Monika Hoinkis
SAC
2006
ACM
15 years 8 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
SBCCI
2006
ACM
200views VLSI» more  SBCCI 2006»
15 years 8 months ago
REDEFIS: a system with a redefinable instruction set processor
The growing complexity and production cost of processor-based systems have imposed big constraints in SoC design of new systems. GPPs and ASICs are unable to fit the tight perform...
Victor M. Goulart Ferreira, Lovic Gauthier, Takayu...
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 8 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
STORAGESS
2006
ACM
15 years 8 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok