• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 283
Next 10 →

PARTIAL RECONFIGURABLE PLATFORMS

by Salman Ahmad, Ahmad Salman , 2011
"... by ..."
Abstract - Add to MetaCart
Abstract not found

IPSEC IMPLEMENTATION IN EMBEDDED SYSTEMS FOR PARTIAL RECONFIGURABLE PLATFORMS

by Ahmad Salman, Ahmad Salman
"... I dedicate this thesis to my parents, Ali Salman and Fatma Mahmoud, my sisters Mona, Hadeel and Inas, my brother Akram for believing in me and for their endless support. iii Acknowledgments First I wish to thank my advisor Dr. Jens-Peter Kaps for his guidance, support and endless patience during the ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
to the right direction and providing a starting point for the thesis as well as valuable resources. I’d also like to thank Dr. Craig Lorie for the time he provided, valuable comments and for understanding when I did not fulfill my duties as his TA on time during my thesis work. Finally, a special thanks to my

CRYPTOGRAPHY AND CRYPTANALYSIS ON RECONFIGURABLE DEVICES Security Implementations for Hardware and

by Reprogrammable Devices, Prof Dr, Christof Paar, Prof Dr, Daniel J. Bernstein
"... Printed in Germany. This thesis is dedicated to Sindy for her love and support throughout the course of this thesis. In loving memory of my parents. Author’s contact information: ..."
Abstract - Add to MetaCart
Printed in Germany. This thesis is dedicated to Sindy for her love and support throughout the course of this thesis. In loving memory of my parents. Author’s contact information:

What security properties can my mobile platform give me?

by Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan Mccune, Amit Vasudevan, Emmanuel Owusu, Zongwei Zhou, James Newsome, Jonathan Mccune , 2011
"... We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. We systema ..."
Abstract - Add to MetaCart
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. We

Security for a High Performance Commodity Storage Subsystem

by Howard Gobioff, M. Satyanarayanan , 1999
"... and the United States Postal Service. The views and conclusions in this document are my own and should not be interpreted as representing the official policies, either expressed or implied, of any supporting organization or the U.S. Government. ..."
Abstract - Cited by 45 (1 self) - Add to MetaCart
and the United States Postal Service. The views and conclusions in this document are my own and should not be interpreted as representing the official policies, either expressed or implied, of any supporting organization or the U.S. Government.

unknown title

by Msc Miguel, Morales Sandoval , 2008
"... A reconfigurable and interoperable hardware architecture for elliptic curve cryptography ..."
Abstract - Add to MetaCart
A reconfigurable and interoperable hardware architecture for elliptic curve cryptography

Lightweight Cryptography: Cryptographic Engineering for a Pervasive World

by Axel York Poschmann - PH.D. THESIS , 2009
"... Increasingly, everyday items are enhanced to pervasive devices by embedding computing power and their interconnection leads to Mark Weiser's famous vision of ubiquitous computing (ubicomp), which is widely believed to be the next paradigm in information technology. The mass deployment of pervas ..."
Abstract - Cited by 23 (3 self) - Add to MetaCart
algorithm, called PRESENT, where we could build upon the results of the first step. A variety of implementation results of PRESENT---both in software and hardware---using different design strategies and different platforms is presented. Our serialized ASIC implementation (1,000 GE) is the smallest published

Security for volatile FPGAs

by Saar Drimer, C Saar Drimer, Saar Drimer , 2009
"... With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on “FPGA sec-urity ” has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique ..."
Abstract - Cited by 13 (0 self) - Add to MetaCart
With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on “FPGA sec-urity ” has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique

SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust

by Karim El Defrawy, Daniele Perito, Gene Tsudik, et al. - IN: PROCEEDINGS OF THE 19TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM
"... Remote attestation is the process of securely verifying internal state of a remote hardware platform. It can be achieved either statically (at boot time) or dynamically, at run-time in order to establish a dynamic root of trust. The latter allows full isolation of a code region from preexisting soft ..."
Abstract - Cited by 13 (6 self) - Add to MetaCart
Remote attestation is the process of securely verifying internal state of a remote hardware platform. It can be achieved either statically (at boot time) or dynamically, at run-time in order to establish a dynamic root of trust. The latter allows full isolation of a code region from preexisting

CRYPTONITE -- A Programmable Crypto Processor Architecture for . . .

by Rainer Buchty , 2002
"... Cryptography was and still is one of the most interesting fields in Computer Science-related research. Where its origin lies in military and governmental use, today cryptography is widely used in everyday life. Cryptography secures communication between smart cards and card readers. It scrambles tra ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
transmissions between DECT telephones and their base stations, it even entered the living rooms through digital Pay TV channels which use cryptographic methods to make sure that only their subscribers can watch their transmissions – and only what they have payed for. Similarly, each DVD player contains
Next 10 →
Results 1 - 10 of 283
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University