Sciweavers

11603 search results - page 49 / 2321
» Securing Embedded Systems
Sort
View
109
Voted
SIES
2010
IEEE
15 years 2 days ago
Optimizing Hierarchical Schedules for Improved Control Performance
Harald Voit, Reinhard Schneider, Dip Goswami, Anur...
SIES
2010
IEEE
15 years 2 days ago
Compositional Translation of Simulink Models into Synchronous BIP
Vassiliki Sfyrla, Georgios Tsiligiannis, Iris Safa...
147
Voted
AFRICACRYPT
2010
Springer
15 years 8 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
129
Voted
BIRTHDAY
2012
Springer
13 years 10 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...