Sciweavers

11603 search results - page 124 / 2321
» Securing Embedded Systems
Sort
View
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
14 years 3 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
SCAM
2007
IEEE
14 years 3 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 3 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ACSAC
2005
IEEE
14 years 2 months ago
Survivability Architecture of a Mission Critical System: The DPASA Example
Jennifer Chong, Partha Pratim Pal, Michael Atighet...
WISA
2004
Springer
14 years 2 months ago
Vulnerability of a Mobile Payment System Proposed at WISA 2002
SangCheol Hwang, Dong Hoon Lee 0002, Daewan Han, J...