Trustworthy Reconfigurable Systems

Enhancing the Security Capabilities of Reconfigurable Hardware Architectures
Author: Thomas Feller
Publisher: Springer
ISBN: 3658070056
Category: Computers
Page: 212
View: 9498

Continue Reading →

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Reconfigurable Computing: Architectures, Tools and Applications

9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013, Proceedings
Author: Philip Brisk,José Gabriel de Figueiredo Coutinho,Pedro Diniz
Publisher: Springer
ISBN: 3642368123
Category: Computers
Page: 238
View: 4329

Continue Reading →

This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Author: Alexander Biedermann,Gregor H Molter
Publisher: Springer Science & Business Media
ISBN: 3642167675
Category: Technology & Engineering
Page: 207
View: 5375

Continue Reading →

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Embedded Multimedia Security Systems

Algorithms and Architectures
Author: Amit Pande,Joseph Zambreno
Publisher: Springer Science & Business Media
ISBN: 1447144597
Category: Computers
Page: 146
View: 4192

Continue Reading →

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
Author: Meikang Qiu,Shouhuai Xu,Moti Yung,Haibo Zhang
Publisher: Springer
ISBN: 3319256459
Category: Computers
Page: 542
View: 9958

Continue Reading →

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Reconfigurable Computing: Architectures, Tools, and Applications

4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings
Author: Roger Woods,Katherine Compton,Christos Bourganis,Pedro C. Diniz
Publisher: Springer
ISBN: 3540786104
Category: Computers
Page: 346
View: 4551

Continue Reading →

Coverage in this proceedings volume includes DNA and string processing applications, reconfigurable computing hardware and systems, image processing, run-time behavior, instruction set extension, as well as random number generation and financial computation.

Advances in Computer Systems Architecture

10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings
Author: Thambipillai Srikanthan,Jingling Xue
Publisher: Springer Science & Business Media
ISBN: 9783540296430
Category: Computers
Page: 833
View: 1674

Continue Reading →

This book constitutes the refereed proceedings of the 10th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2005, held in Singapore in October 2005. The 65 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers are organized in topical sections on energy efficient and power aware techniques, methodologies and architectures for application-specific systems, processor architectures and microarchitectures, high-reliability and fault-tolerant architectures, compiler and OS for emerging architectures, data value predictions, reconfigurable computing systems and polymorphic architectures, interconnect networks and network interfaces, parallel architectures and computation models, hardware-software partitioning, verification, and testing of complex architectures, architectures for secured computing, simulation and performance evaluation, architectures for emerging technologies and applications, and memory systems hierarchy and management.

Networking and Information Technology Research and Development Program

Supplement to the President's Budget for Fiscal Year 2009
Author: Sally E. Howe
Publisher: DIANE Publishing
ISBN: 1437901794
Page: 32
View: 6969

Continue Reading →

Describes R&D activities in advanced networking, software, high-end computing and computational science, cyber security, and other leading-edge information technologies (IT) funded by the 13 Fed. Agencies in the Networking and IT R&D (NITRD) Program. Capabilities and tools generated through NITRD investments accelerate advances across the spectrum of science, engineering, and technology fields, supporting key national security and scientific missions of the Fed. Gov¿t. and enhancing the Nation's economic competitiveness. The Pres.¿s FY2009 Budget provides a 6% increase for the NITRD Program overall, reflecting the vital contributions of networking and IT to sustaining U.S. leadership in science and technology.

Cybersecurity Systems for Human Cognition Augmentation

Author: Robinson E. Pino,Alexander Kott,Michael Shevenell
Publisher: Springer
ISBN: 3319103741
Category: Computers
Page: 209
View: 6149

Continue Reading →

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Annual Review of Communications:

Author: International Engineering Consortium
Publisher: International Engineering Consortium
ISBN: 9781931695534
Category: Business & Economics
Page: 750
View: 509

Continue Reading →

An indispensable reference publication for telecommunication and information-industry professionals. Each year, the IEC brings together into one unique resource the most current thinking and practical experience of industry leaders around the world on a variety of topics facing their areas of specialization. This 700+ page reference tool is a must for executives, managers, engineers, analysts, and educators in all sectors of today's changing information industry.

FPGA ...

ACM/SIGDA International Symposium on Field Programmable Gate Arrays
Author: N.A
Publisher: N.A
ISBN: 9781595936004
Category: Field programmable gate arrays
Page: 234
View: 9004

Continue Reading →

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
Author: Eugene Asarin,Dieter Gollmann,Jan Meier,Andrei Sabelfeld
Publisher: Springer
ISBN: 3540446052
Category: Computers
Page: 550
View: 2130

Continue Reading →

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.