Sciweavers

11603 search results - page 119 / 2321
» Securing Embedded Systems
Sort
View
RECOSOC
2007
116views Hardware» more  RECOSOC 2007»
13 years 10 months ago
IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Eduardo Wanderley Netto, Reouven Elbaz, Lionel Tor...
ICASSP
2008
IEEE
14 years 3 months ago
Air-coupled ultrasound time-of-flight estimation for shipping container cargo verification
The falling cost of embedded sensor systems has opened up the possibility of in-transit air-coupled ultrasound interior imaging of shipping container cargo. This new technology co...
Patrick McVittie, Les E. Atlas
IWIA
2006
IEEE
14 years 3 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...
DRM
2005
Springer
14 years 2 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 2 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory