• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 35
Next 10 →

Secure Cryptographic Precomputation with Insecure Memory ⋆

by Patrick P. Tsang, Sean W. Smith
"... Abstract. We propose a solution that provides secure storage for cryptographic precomputation using only insecure memory that is susceptible to eavesdropping and tampering. Specifically, we design a small tamper-resistant hardware module, the Queue Security Proxy (QSP), that situates transparently o ..."
Abstract - Add to MetaCart
on the data-path between the processor and the insecure memory. Our analysis shows that our design is secure and flexible, and yet efficient and inexpensive. In particular, both the timing overhead and the hardware cost of our solution are independent of the storage size.

Gender, Food Insecurity and IFIs in Kenya

by unknown authors
"... Approximately 10 percent of Kenya’s population, or 3.8 million people, live in a chronic state of food insecurity (USDA, 2009), the most vulnerable of whom include women and children (Kimani-Murage, et al., 2011). Although women constitute 75 percent of Kenya’s agricultural labor force, gender inequ ..."
Abstract - Add to MetaCart
Approximately 10 percent of Kenya’s population, or 3.8 million people, live in a chronic state of food insecurity (USDA, 2009), the most vulnerable of whom include women and children (Kimani-Murage, et al., 2011). Although women constitute 75 percent of Kenya’s agricultural labor force, gender

Virtual Secure Co-Processing on General-purpose Processors

by John P. Mcgregor, Ruby B. Lee , 2002
"... Cryptographic processing is a critical component of secure Internet-connected computing systems. Furthermore, the methods employed to manage, store, and exercise a user’s cryptographic keys greatly affect the security offered by cryptographic operations. Software-only user key management schemes con ..."
Abstract - Cited by 14 (2 self) - Add to MetaCart
, performance penalties, and high cost. In this paper, we propose architectural features for general-purpose processors that facilitate virtual secure coprocessing. We describe modest hardware modifications and a trusted software library that allow general-purpose processors to perform flexible, high

Caisson: A Hardware Description Language for Secure Information Flow

by Xun Li, Mohit Tiwari, Jason K. Oberg, Vineeth Kashyap, Frederic T. Chong, Timothy Sherwood, Ben Hardekopf - IN PROCEEDINGS OF PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI 2011 , 2011
"... Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s root of trust. We incorporate insights and techniques from designing information-flow secure programming languages to provide a ..."
Abstract - Cited by 16 (6 self) - Add to MetaCart
consumption, and clock frequency with both a standard (insecure) commercial processor and also a processor augmented at the gate level to dynamically track information flow. Our processor is competitive with the insecure processor and significantly better than dynamic tracking.

Micro Embedded Monitoring for Security in Application Specific Instruction-set Processors

by Roshan G. Ragel - In Proceedings of the CASES’05 , 2005
"... This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstructions are embedded into the critical machin ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insecure operations in machine instructions at microinstruction level. Microinstructions are embedded into the critical

Modern Vehicle Safety System And Fuel Level Intimation using ARM processor

by unknown authors
"... Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibility for taking steps to ensure the authorization for the owners and also in built the anti theft system to prevent the vehicle from the theft.ARM pr ..."
Abstract - Add to MetaCart
Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibility for taking steps to ensure the authorization for the owners and also in built the anti theft system to prevent the vehicle from the theft

A Low Cost Advanced Encryption Standard (AES) Co-Processor Implementation

by O J. Hern, Thomas Sodon, Michael Adel
"... The need for privacy has become a major priority for both governments and civilians desiring protection from signal interception. Widespread use of personal communications devices has only increased demand for a level of security on previously insecure communications. This paper presents a novel low ..."
Abstract - Add to MetaCart
The need for privacy has become a major priority for both governments and civilians desiring protection from signal interception. Widespread use of personal communications devices has only increased demand for a level of security on previously insecure communications. This paper presents a novel

Capture of an Intruder by Mobile Agents

by Lali Barrière, Paola Flocchini, Pierre Fraigniaud, Nicola Santoro , 2002
"... Consider a team of mobile software agents deployed to capture a (possibly hostile) intruder in a network. All agents, including the intruder move along the network links; the intruder could be arbitrarily fast, and aware of the positions of all the agents. The problem is to design the agents' s ..."
Abstract - Cited by 69 (22 self) - Add to MetaCart
, or cannot reach an arbitrary point of the network via an internal travel through insecure zones. This motivates the contiguous search problem in which agents cannot be removed from the network, and clear links must form a connected sub-network at any time, providing safety of movements. This new problem

High-Bandwidth Encryption with Low-Bandwidth Smartcards

by Matt Blaze - In Fast Software Encryption , 1995
"... This paper describes a simple protocol, the Remotely Keyed Encryption Protocol (RKEP), that enables a secure, but bandwidth-limited, cryptographic smartcard to function as a highbandwidth secret-key encryption and decryption engine for an insecure, but fast, host processor. The host processor assum ..."
Abstract - Cited by 43 (1 self) - Add to MetaCart
This paper describes a simple protocol, the Remotely Keyed Encryption Protocol (RKEP), that enables a secure, but bandwidth-limited, cryptographic smartcard to function as a highbandwidth secret-key encryption and decryption engine for an insecure, but fast, host processor. The host processor

Hardware Enforcement of Application Security Policies Using Tagged Memory

by Nickolai Zeldovich, Hari Kannan, Michael Dalton, Christos Kozyrakis
"... Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions and ..."
Abstract - Cited by 41 (7 self) - Add to MetaCart
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware page tables. Recent work has shown that application policies can be expressed in terms of information flow restrictions
Next 10 →
Results 1 - 10 of 35
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University