Optimization of Message Encryption for Real-Time Applications in Embedded Systems
暂无分享,去创建一个
[1] A. Cervin,et al. Optimal On-line Sampling Period Assignment for Real-Time Control Tasks Based on Plant State Information , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[2] Petru Eles,et al. Optimization of message encryption for distributed embedded systems with real-time constraints , 2011, 14th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems.
[3] Petru Eles,et al. Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications , 2016, RTNS.
[4] Sang Hyuk Son,et al. Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[5] Xiao Qin,et al. Improving security for periodic tasks in embedded systems through scheduling , 2007, TECS.
[6] Hermann Kopetz. A solution to an automotive control system benchmark , 1994, 1994 Proceedings Real-Time Systems Symposium.
[7] Alberto L. Sangiovanni-Vincentelli,et al. Moving From Federated to Integrated Architectures in Automotive: The Role of Standards, Methods and Tools , 2010, Proceedings of the IEEE.
[8] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[9] Petru Eles,et al. Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[10] James W. Layland,et al. Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment , 1989, JACM.
[11] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[12] Thomas Peyrin,et al. Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[13] Amir Aminifar,et al. Analysis, Design, and Optimization of Embedded Control Systems , 2016 .
[14] Giorgio C. Buttazzo,et al. Rate-adaptive tasks: Model, analysis, and design issues , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[15] Joos Vandewalle,et al. Linear Cryptanalysis of RC5 and RC6 , 1999, FSE.
[16] Guido Bertoni,et al. Cryptographic Hardware and Embedded Systems - CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings , 2013, Lecture Notes in Computer Science.
[17] Karl-Erik Årzén,et al. Feedback–Feedforward Scheduling of Control Tasks , 2002, Real-Time Systems.
[18] Petru Eles,et al. Quality-driven synthesis of embedded multi-mode control systems , 2009, 2009 46th ACM/IEEE Design Automation Conference.
[19] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[20] Giorgio C. Buttazzo,et al. HARD REAL-TIME COMPUTING SYSTEMS Predictable Scheduling Algorithms and Applications , 2007 .
[21] Jakob Engblom,et al. The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.
[22] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[23] Michael D. Harrison,et al. Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings , 2008, SAFECOMP.
[24] Giorgio C. Buttazzo,et al. Measuring the Performance of Schedulability Tests , 2005, Real-Time Systems.
[25] Christof Paar,et al. Embedded Security in Cars: Securing Current and Future Automotive IT Applications , 2005 .
[26] Man-Ki Yoon,et al. Real-Time Systems Security through Scheduler Constraints , 2014, 2014 26th Euromicro Conference on Real-Time Systems.
[27] Burton S. Kaliski,et al. On the Security of the RC5 Encryption Algorithm , 1998 .
[28] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[29] Petru Eles,et al. Optimization of secure embedded systems with dynamic task sets , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[30] Mokhtar S. Bazaraa,et al. Nonlinear Programming: Theory and Algorithms , 1993 .
[31] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[32] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[33] Reinhold Heckmann,et al. Worst case execution time prediction by static program analysis , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[34] Ragunathan Rajkumar,et al. Rhythmic Tasks: A New Task Model with Continually Varying Periods for Cyber-Physical Systems , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.