Sciweavers

1597 search results - page 48 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
PDCAT
2005
Springer
14 years 1 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 17 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 9 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
BIOSIG
2008
143views Biometrics» more  BIOSIG 2008»
13 years 9 months ago
A Reference Architecture for Biometric Template Protection based on Pseudo Identities
Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...