Optimization of secure embedded systems with dynamic task sets
暂无分享,去创建一个
[1] Sri Parameswaran,et al. SHIELD: A software hardware design methodology for security and reliability of MPSoCs , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[2] Willi Meier,et al. Correlations in RC6 with a Reduced Number of Rounds , 2000, FSE.
[3] Petr Fiedler,et al. Performance evaluation of symmetric cryptography in embedded systems , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.
[4] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[5] DebK.,et al. A fast and elitist multiobjective genetic algorithm , 2002 .
[6] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[7] Meikang Qiu,et al. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software , 2006, IEEE Transactions on Computers.
[8] Lothar Thiele,et al. Multiobjective Optimization Using Evolutionary Algorithms - A Comparative Case Study , 1998, PPSN.
[9] Dengguo Feng,et al. New Results on Impossible Differential Cryptanalysis of Reduced AES , 2007, ICISC.
[10] Petru Eles,et al. Quality-driven synthesis of embedded multi-mode control systems , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[11] Catherine H. Gebotys. A table masking countermeasure for low-energy secure embedded systems , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[12] Xiao Qin,et al. Improving security for periodic tasks in embedded systems through scheduling , 2007, TECS.
[13] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[14] Kalyanmoy Deb,et al. A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..
[15] Petru Eles,et al. Optimization of message encryption for distributed embedded systems with real-time constraints , 2011, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems.
[16] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[17] Wei Jiang,et al. Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[18] Ingrid Verbauwhede,et al. A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[19] Eyal Kushilevitz,et al. Improved Cryptanalysis of RC5 , 1998, EUROCRYPT.
[20] Petru Eles,et al. Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[21] Jongsung Kim,et al. New Impossible Differential Attacks on AES , 2008, INDOCRYPT.