Sciweavers

2429 search results - page 42 / 486
» Using Aspects to Design a Secure System
Sort
View
CIC
2006
124views Communications» more  CIC 2006»
13 years 9 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
EUROMICRO
1999
IEEE
14 years 1 days ago
Software Synthesis for System Level Design Using Process Execution Trees
Software synthesis for system level design languages becomes feasible because the current technology, pricing and application trends will most likely alleviate the industrial empha...
Leo J. van Bokhoven, Jeroen Voeten, Marc Geilen
ICPR
2006
IEEE
14 years 8 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
SOUPS
2006
ACM
14 years 1 months ago
Aligning usability and security: a usability study of Polaris
Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Alexander J. DeWitt, Jasna Kuljis
ESCIENCE
2007
IEEE
14 years 2 months ago
Towards a Grid-Enabled Simulation Framework for Nano-CMOS Electronics
The electronics design industry is facing major challenges as transistors continue to decrease in size. The next generation of devices will be so small that the position of indivi...
Liangxiu Han, Asen Asenov, Dave Berry, Campbell Mi...