Sciweavers

897 search results - page 36 / 180
» Security Requirements for RFID Computing Systems
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
On the use of one-way chain based authentication protocols in secure control systems
The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial ...
Bogdan Groza, Toma-Leonida Dragomir
DAC
2007
ACM
14 years 9 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
ISORC
2008
IEEE
14 years 2 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
13 years 6 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
WORDS
2003
IEEE
14 years 1 months ago
Middleware Support for Embedded Software with Multiple QoS Properties for Ubiquitous Computing Environments
Ubiquitous application software usually has multiple QoS requirements, such as situationawareness, real-time, and security, which make the application software development complic...
Stephen S. Yau, Yu Wang, Dazhi Huang