SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
3GTSM: a novel 3G terminals security model
IMCAS'07 Proceedings of the 6th WSEAS International Conference on Instrumentation, Measurement, Circuits and Systems
Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
Hardware Trojan horse detection using gate-level characterization
Proceedings of the 46th Annual Design Automation Conference
A new security framework for embedded component systems
SEA '07 Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
I2CSec: A secure serial Chip-to-Chip communication protocol
Journal of Systems Architecture: the EUROMICRO Journal
Efficient scheme of verifying integrity of application binaries in embedded operating systems
The Journal of Supercomputing
Randomized Instruction Injection to Counter Power Analysis Attacks
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.00 |
A top-down, multiabstraction layer approach for embedded security design reduces the risk of security flaws, letting designers maximize security while limiting area, energy, and computation costs.