Sciweavers

1116 search results - page 98 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
DAC
1997
ACM
14 years 4 days ago
Static Timing Analysis of Embedded Software
This paper examines the problem of statically analyzing the performance of embedded software. This problem is motivated by the increasing growth of embedded systems and a lack of ...
Sharad Malik, Margaret Martonosi, Yau-Tsun Steven ...
WISA
2004
Springer
14 years 1 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ACSAC
2003
IEEE
14 years 1 months ago
S-ARP: a Secure Address Resolution Protocol
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution P...
Danilo Bruschi, A. Ornaghi, Emilia Rosti
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
13 years 11 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
DCOSS
2006
Springer
13 years 11 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li