Sciweavers

3516 search results - page 71 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DBSEC
2007
128views Database» more  DBSEC 2007»
13 years 10 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network file system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
IICAI
2003
13 years 10 months ago
Biometric Security Systems: Fingerprint and Speech Technology
: This paper deals with the design of a biometric security system based upon the fingerprint and speech technology. In the first chapter there are the biometric security systems an...
Filip Orság, Martin Drahanský
DAC
2010
ACM
14 years 15 days ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DAC
2005
ACM
14 years 9 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...
QOSA
2007
Springer
14 years 3 months ago
Extending the Capabilities of Component Models for Embedded Systems
Component-based development helps to improve the modularity and reusability of embedded systems. Component models devised for embedded systems are typically restricted due to the l...
Ihor Kuz, Yan Liu