Sciweavers

2517 search results - page 315 / 504
» Secure Deployment of Components
Sort
View
CCS
2011
ACM
12 years 9 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
DAC
1998
ACM
14 years 10 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
WETICE
2006
IEEE
14 years 3 months ago
Architecture of a Network Monitoring Element
A Network Monitoring system is a vital component of a Grid; however, its scalability is a challenge. We propose a network monitoring approach that combines passive monitoring, a do...
Augusto Ciuffoletti, Michalis Polychronakis
SAC
2006
ACM
14 years 3 months ago
Towards chemical coordination for grids
ide, applications are programmed in an abstract manner describing essentially the chemical coordination between (not necessarily chemical) software components. On the other side, c...
Jean-Pierre Banâtre, Pascal Fradet, Yann Rad...
ISI
2005
Springer
14 years 2 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang