Research challenges in wireless networks of biomedical sensors

L Schwiebert, SKS Gupta, J Weinmann - Proceedings of the 7th annual …, 2001 - dl.acm.org
Implanted biomedical devices have the potential to revolutionize medicine. Smart sensors,
which are created by combining sensing materials with integrated circuitry, are being …

Memory encryption: A survey of existing techniques

M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide
confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …

SPINS: Security protocols for sensor networks

A Perrig, R Szewczyk, V Wen, D Culler… - Proceedings of the 7th …, 2001 - dl.acm.org
As sensor networks edge closer towards wide-spread deployment, security issues become a
central concern. So far, much research has focused on making sensor networks feasible and …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Architectural support for copy and tamper resistant software

D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh… - Acm Sigplan …, 2000 - dl.acm.org
Although there have been attempts to develop code transformations that yield tamper-
resistant software, no reliable software-only methods are known. This paper studies the …

Secure reversible image data hiding over encrypted domain via key modulation

J Zhou, W Sun, L Dong, X Liu, OC Au… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper proposes a novel reversible image data hiding scheme over encrypted domain.
Data embedding is achieved through a public key modulation mechanism, in which access …

[图书][B] Wireless sensor network designs

A Hac - 2003 - oms.bdu.ac.in
The emergence of compact, low-power, wireless communication sensors and actuators in
the technology supporting the ongoing miniaturization of processing and storage, allows for …

Efficient memory integrity verification and encryption for secure processors

GE Suh, D Clarke, B Gasend… - … . 36th Annual IEEE …, 2003 - ieeexplore.ieee.org
Secure processors enable new sets of applications such as commercial grid computing,
software copy-protection, and secure mobile agents by providing security from both physical …

Improving cost, performance, and security of memory encryption and authentication

C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving
increasing attention in computer architecture. This paper presents a new combined memory …

DEUCE: Write-efficient encryption for non-volatile memories

V Young, PJ Nair, MK Qureshi - ACM SIGARCH Computer Architecture …, 2015 - dl.acm.org
Phase Change Memory (PCM) is an emerging Non Volatile Memory (NVM) technology that
has the potential to provide scalable high-density memory systems. While the non-volatility …