Sciweavers

355 search results - page 19 / 71
» Security Test Generation Using Threat Trees
Sort
View
GLVLSI
2009
IEEE
113views VLSI» more  GLVLSI 2009»
14 years 1 months ago
Reducing parity generation latency through input value aware circuits
1 Soft errors caused by cosmic particles and radiation emitted by the packaging are an important problem in contemporary microprocessors. Parity bits are used to detect single bit ...
Yusuf Osmanlioglu, Y. Onur Koçberber, Oguz ...
CRITIS
2009
13 years 11 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
SIBGRAPI
1999
IEEE
14 years 2 months ago
Deterministic Texture Analysis and Synthesis Using Tree Structure Vector Quantization
Texture analysis and synthesis is very important for computer graphics, vision, and image processing. This paper describes an algorithm which can produce new textures with a matchi...
Li-Yi Wei
SOUPS
2005
ACM
14 years 3 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
CODES
2007
IEEE
14 years 4 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...