M Henson, S Taylor - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Memory encryption has yet to be used at the core of operating system designs to provide confidentiality of code and data. As a result, numerous vulnerabilities exist at every level of …
A Perrig, R Szewczyk, V Wen, D Culler… - Proceedings of the 7th …, 2001 - dl.acm.org
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, much research has focused on making sensor networks feasible and …
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system …
Although there have been attempts to develop code transformations that yield tamper- resistant software, no reliable software-only methods are known. This paper studies the …
J Zhou, W Sun, L Dong, X Liu, OC Au… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
This paper proposes a novel reversible image data hiding scheme over encrypted domain. Data embedding is achieved through a public key modulation mechanism, in which access …
The emergence of compact, low-power, wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage, allows for …
Secure processors enable new sets of applications such as commercial grid computing, software copy-protection, and secure mobile agents by providing security from both physical …
C Yan, D Englender, M Prvulovic, B Rogers… - ACM SIGARCH …, 2006 - dl.acm.org
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory …
Phase Change Memory (PCM) is an emerging Non Volatile Memory (NVM) technology that has the potential to provide scalable high-density memory systems. While the non-volatility …