Sciweavers

11603 search results - page 118 / 2321
» Securing Embedded Systems
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
ICPADS
2007
IEEE
14 years 3 months ago
Embedded education for Computer Rank Examination
Embedded system has become one of the most important directions in computer education. Embedded system is at the intersection of control system, command and control, wireless data...
Tianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan
ICIP
2000
IEEE
14 years 10 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
DELTA
2008
IEEE
14 years 3 months ago
AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis
Re-using embedded resources for implementing builtin self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement costefficient built-in self tes...
M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
13 years 10 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...