Sciweavers

11603 search results - page 32 / 2321
» Securing Embedded Systems
Sort
View
ESORICS
1998
Springer
14 years 28 days ago
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video
Jean-Paul M. G. Linnartz, Joop Talstra
CASES
2004
ACM
14 years 2 months ago
A low power architecture for embedded perception
Recognizing speech, gestures, and visual features are important interface capabilities for future embedded mobile systems. Unfortunately, the real-time performance requirements of...
Binu K. Mathew, Al Davis, Michael Parker
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 6 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
JUCS
2008
143views more  JUCS 2008»
13 years 8 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
14 years 1 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel