Sciweavers

11603 search results - page 125 / 2321
» Securing Embedded Systems
Sort
View
ACISP
2003
Springer
15 years 5 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
86
Voted
ACSAC
2010
IEEE
15 years 8 days ago
Hardware assistance for trustworthy systems through 3-D integration
Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood,...
CCS
2008
ACM
15 years 4 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
IEEESP
2011
14 years 5 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...