Sciweavers

11603 search results - page 70 / 2321
» Securing Embedded Systems
Sort
View
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
IJNSEC
2008
112views more  IJNSEC 2008»
13 years 8 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
BIRTHDAY
2012
Springer
12 years 4 months ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova
IWSAS
2000
Springer
14 years 11 days ago
Model-Integrated Embedded Systems
Abstract. Model-Integrated Computing is a proven technology for designing and implementing complex software systems. Making the designtime models available at run-time benefits the...
Ákos Lédeczi, Arpad Bakay, Miklos Ma...
SACMAT
2009
ACM
14 years 1 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...