Sciweavers

264 search results - page 31 / 53
» Software Protection by Hardware and Obfuscation
Sort
View
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Radical Approach to Network-on-Chip Operating Systems
Operating systems were created to provide multiple tasks with access to scarce hardware resources like CPU, memory, or storage. Modern programmable hardware, however, may contain ...
Michael Engel, Olaf Spinczyk
AES
2004
Springer
190views Cryptology» more  AES 2004»
14 years 1 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
GCA
2009
13 years 5 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
MTA
2011
203views Hardware» more  MTA 2011»
13 years 2 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
14 years 27 days ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev