Trustworthy Reconfigurable Systems

Enhancing the Security Capabilities of Reconfigurable Hardware Architectures

Author: Thomas Feller

Publisher: Springer

ISBN: 3658070056

Category: Computers

Page: 212

View: 1406

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Reconfigurable Computing: Architectures, Tools and Applications

9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013, Proceedings

Author: Philip Brisk,José Gabriel de Figueiredo Coutinho,Pedro Diniz

Publisher: Springer

ISBN: 3642368123

Category: Computers

Page: 238

View: 966

This book constitutes the thoroughly refereed conference proceedings of the 9th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2013, held in Los Angeles, CA, USA, in March 2013. The 28 revised papers presented, consisting of 20 full papers and 11 poster papers were carefully selected from 41 submissions. The topics covered are applications, arithmetic, design optimization for FPGAs, architectures, place and routing.

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

Author: Alexander Biedermann,Gregor H Molter

Publisher: Springer Science & Business Media

ISBN: 3642167675

Category: Technology & Engineering

Page: 207

View: 3077

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Network and System Security

9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings

Author: Meikang Qiu,Shouhuai Xu,Moti Yung,Haibo Zhang

Publisher: Springer

ISBN: 3319256459

Category: Computers

Page: 542

View: 9653

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.

Proceedings of the International Conference on Information Engineering, Management and Security 2015

ICIEMS 2015

Author: Vignesh Ramakrishnan,Prasanth Venugopal,Tuhin Mukherjee

Publisher: Association of Scientists, Developers and Faculties (ASDF)

ISBN: 8192974278

Category: Computers

Page: 342

View: 6075

ICIEMS 2015 is the conference aim is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Engineering Technology, Industrial Engineering, Application Level Security and Management Science. This conference provides opportunities for the delegates to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration.

Embedded Multimedia Security Systems

Algorithms and Architectures

Author: Amit Pande,Joseph Zambreno

Publisher: Springer Science & Business Media

ISBN: 1447144597

Category: Computers

Page: 146

View: 2252

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Proceedings

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Computer engineering

Page: N.A

View: 3563


Forbes

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Business

Page: N.A

View: 5482


Networking and Information Technology Research and Development Program

Supplement to the President's Budget for Fiscal Year 2009

Author: Sally E. Howe

Publisher: DIANE Publishing

ISBN: 1437901794

Category:

Page: 32

View: 4935

Describes R&D activities in advanced networking, software, high-end computing and computational science, cyber security, and other leading-edge information technologies (IT) funded by the 13 Fed. Agencies in the Networking and IT R&D (NITRD) Program. Capabilities and tools generated through NITRD investments accelerate advances across the spectrum of science, engineering, and technology fields, supporting key national security and scientific missions of the Fed. Gov¿t. and enhancing the Nation's economic competitiveness. The Pres.¿s FY2009 Budget provides a 6% increase for the NITRD Program overall, reflecting the vital contributions of networking and IT to sustaining U.S. leadership in science and technology.

Advances in Computer Systems Architecture

10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings

Author: Thambipillai Srikanthan,Jingling Xue

Publisher: Springer Science & Business Media

ISBN: 9783540296430

Category: Computers

Page: 833

View: 3492

This book constitutes the refereed proceedings of the 10th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2005, held in Singapore in October 2005. The 65 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers are organized in topical sections on energy efficient and power aware techniques, methodologies and architectures for application-specific systems, processor architectures and microarchitectures, high-reliability and fault-tolerant architectures, compiler and OS for emerging architectures, data value predictions, reconfigurable computing systems and polymorphic architectures, interconnect networks and network interfaces, parallel architectures and computation models, hardware-software partitioning, verification, and testing of complex architectures, architectures for secured computing, simulation and performance evaluation, architectures for emerging technologies and applications, and memory systems hierarchy and management.

Annual Review of Communications:

Author: International Engineering Consortium

Publisher: International Engineering Consortium

ISBN: 9781931695534

Category: Business & Economics

Page: 750

View: 7022

An indispensable reference publication for telecommunication and information-industry professionals. Each year, the IEC brings together into one unique resource the most current thinking and practical experience of industry leaders around the world on a variety of topics facing their areas of specialization. This 700+ page reference tool is a must for executives, managers, engineers, analysts, and educators in all sectors of today's changing information industry.

Cybersecurity Systems for Human Cognition Augmentation

Author: Robinson E. Pino,Alexander Kott,Michael Shevenell

Publisher: Springer

ISBN: 3319103741

Category: Computers

Page: 209

View: 8492

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.