Electromagnetic radiation from video display units: an eavesdropping risk?
Computers and Security
Designing programs that check their work
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Network Security Under Siege: The Timing Attack
Computer - Special issue: neural computing: companion issue to Spring 1996 IEEE Computational Science & Engineering
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
BT Technology Journal
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Subword Parallelism with MAX-2
IEEE Micro
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Tamper Resistant Software: An Implementation
Proceedings of the First International Workshop on Information Hiding
Battery-Driven System Design: A New Frontier in Low Power Design
ASP-DAC '02 Proceedings of the 2002 Asia and South Pacific Design Automation Conference
Wired versus Wireless Security: The Internet, WAP and iMode for E-Commerce
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
On the importance of checking cryptographic protocols for faults
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
A server-aided signature scheme for mobile commerce
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Block cache for embedded systems
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
International Journal of Web and Grid Services
Efficient software architecture for IPSec acceleration using a programmable security processor
Proceedings of the conference on Design, automation and test in Europe
Security Analysis of an IP Phone: Cisco 7960G
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Information Security Applications
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Information Security and Cryptology
Configuration-based approach to embedded device security
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
As intelligent electronic systems pervade all aspects of our lives, capturing, storing, and communicating a wide range of sensitive and personal data, security is emerging as a critical concern that must be addressed in order to enable several current and future applications. Mobile appliances, which will play a critical role in enabling the visions of ubiquitous computing and communications, and ambient intelligence, are perhaps the most challenging to secure 驴 they often rely on a public medium for (wireless) communications, are easily lost or stolen due to their small form factors and mobility, and are highly constrained in cost and size, as well as computing and battery resources. This paper presents an introduction to security concerns in mobile appliances, and translates them into challenges that confront system architects, HW engineers, and SW developers, including how to bridge the processing and battery gaps, efficient tamper-proofing of devices, content protection, etc. Recent innovations and emerging commercial technologies that address these issues are also highlighted. We envision that, for a large class of embedded systems, security considerations will pervade all aspects of system design, driving innovations in system architecture, software, circuits, and design methodologies.