Sciweavers

11603 search results - page 76 / 2321
» Securing Embedded Systems
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 5 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
SEUS
2009
IEEE
14 years 3 months ago
Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems
Many special-purpose embedded systems such as automobiles and aircrafts consist of multiple embedded controllers connected through embedded network interconnects. Such network inte...
Hyun-Wook Jin, Junbeom Yoo
DSD
2006
IEEE
109views Hardware» more  DSD 2006»
14 years 2 months ago
ATOMI II - Framework for Easy Building of Object-oriented Embedded Systems
Traditionally, an embedded system design process demands a considerable amount of expertise, time and money. This makes developing embedded systems difficult for many companies, a...
Tero Vallius, Juha Röning
IEICET
2008
147views more  IEICET 2008»
13 years 8 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
JDCTA
2010
113views more  JDCTA 2010»
13 years 3 months ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng