Trustworthy Reconfigurable Systems

Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

Author: Thomas Feller

Publisher: Springer

ISBN: 3658070056

Category: Computers

Page: 212

View: 9522

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Reconfigurable Computing: Architectures, Tools and Applications

9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013, Proceedings

Author: Philip Brisk,José Gabriel de Figueiredo Coutinho,Pedro Diniz

Publisher: Springer

ISBN: 3642368123

Category: Computers

Page: 238

View: 2790

This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

Author: Alexander Biedermann,Gregor H Molter

Publisher: Springer Science & Business Media

ISBN: 3642167675

Category: Technology & Engineering

Page: 207

View: 8619

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

Author: Meikang Qiu,Shouhuai Xu,Moti Yung,Haibo Zhang

Publisher: Springer

ISBN: 3319256459

Category: Computers

Page: 542

View: 2526

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Embedded Multimedia Security Systems

Algorithms and Architectures

Author: Amit Pande,Joseph Zambreno

Publisher: Springer Science & Business Media

ISBN: 1447144589

Category: Computers

Page: 146

View: 3690

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Reconfigurable Computing: Architectures, Tools, and Applications

4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings

Author: Roger Woods,Katherine Compton,Christos Bourganis,Pedro C. Diniz

Publisher: Springer

ISBN: 3540786104

Category: Computers

Page: 346

View: 9964

Coverage in this proceedings volume includes DNA and string processing applications, reconfigurable computing hardware and systems, image processing, run-time behavior, instruction set extension, as well as random number generation and financial computation.

Networking and Information Technology Research and Development Program

Supplement to the President's Budget for Fiscal Year 2009

Author: Sally E. Howe

Publisher: DIANE Publishing

ISBN: 1437901794


Page: 32

View: 3514

Describes R&D activities in advanced networking, software, high-end computing and computational science, cyber security, and other leading-edge information technologies (IT) funded by the 13 Fed. Agencies in the Networking and IT R&D (NITRD) Program. Capabilities and tools generated through NITRD investments accelerate advances across the spectrum of science, engineering, and technology fields, supporting key national security and scientific missions of the Fed. Gov¿t. and enhancing the Nation's economic competitiveness. The Pres.¿s FY2009 Budget provides a 6% increase for the NITRD Program overall, reflecting the vital contributions of networking and IT to sustaining U.S. leadership in science and technology.


Author: N.A

Publisher: N.A


Category: Computer engineering

Page: N.A

View: 2211

Advances in Computer Systems Architecture

10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings

Author: Thambipillai Srikanthan,Jingling Xue

Publisher: Springer Science & Business Media

ISBN: 9783540296430

Category: Computers

Page: 833

View: 8186

This book constitutes the refereed proceedings of the 10th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2005, held in Singapore in October 2005. The 65 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers are organized in topical sections on energy efficient and power aware techniques, methodologies and architectures for application-specific systems, processor architectures and microarchitectures, high-reliability and fault-tolerant architectures, compiler and OS for emerging architectures, data value predictions, reconfigurable computing systems and polymorphic architectures, interconnect networks and network interfaces, parallel architectures and computation models, hardware-software partitioning, verification, and testing of complex architectures, architectures for secured computing, simulation and performance evaluation, architectures for emerging technologies and applications, and memory systems hierarchy and management.


Author: N.A

Publisher: N.A


Category: Business

Page: N.A

View: 1047

Annual Review of Communications:

Author: International Engineering Consortium

Publisher: International Engineering Consortium

ISBN: 9781931695534

Category: Business & Economics

Page: 750

View: 4288

An indispensable reference publication for telecommunication and information-industry professionals. Each year, the IEC brings together into one unique resource the most current thinking and practical experience of industry leaders around the world on a variety of topics facing their areas of specialization. This 700+ page reference tool is a must for executives, managers, engineers, analysts, and educators in all sectors of today's changing information industry.

Cybersecurity Systems for Human Cognition Augmentation

Author: Robinson E. Pino,Alexander Kott,Michael Shevenell

Publisher: Springer

ISBN: 3319103741

Category: Computers

Page: 209

View: 9785

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

FPGA ...

ACM/SIGDA International Symposium on Field Programmable Gate Arrays

Author: N.A

Publisher: N.A

ISBN: 9781595936004

Category: Field programmable gate arrays

Page: 234

View: 2484

Encyclopedia of Computer Science

Author: Edwin D. Reilly

Publisher: Van Nostrand Reinhold Company


Category: Computer science

Page: 1558

View: 4856

The reference of choice for everyone who works with computers, this manual has long been the only single-source volume reference to cover the entire field of computer science. The new edition will maintain this source as the #1 authority in the field, by providing valuable data on the most current computing systems, operating systems, and distributed computing environments. About 70 percent of the information has been revised--with nearly 175 completely new entries. The encyclopedia's renowned editorial board has made sure this databank encompasses everything from the history of electronic computing to the most current research in computer technology. 12-page color insert.

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

Author: Eugene Asarin,Dieter Gollmann,Jan Meier,Andrei Sabelfeld

Publisher: Springer

ISBN: 3540446052

Category: Computers

Page: 550

View: 8044

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.