-
1
-
-
0034313810
-
Integrating security and real-time requirements using covert channel capacity
-
S. Son, R. Mukkamala, and R. David Integrating security and real-time requirements using covert channel capacity IEEE Trans. Knowl. Data Eng. 12 2000 865 879
-
(2000)
IEEE Trans. Knowl. Data Eng.
, vol.12
, pp. 865-879
-
-
Son, S.1
Mukkamala, R.2
David, R.3
-
2
-
-
4444331720
-
Security as a new dimension in embedded system design
-
P. Kocher, R. Lee, G. Mcgraw, A. Raghunathan, S. Ravi, Security as a new dimension in embedded system design, in: Proceedings of ACM/IEEE DAC, 2004, pp. 753-760.
-
(2004)
Proceedings of ACM/IEEE DAC
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
3
-
-
36348941936
-
Improving security for periodic tasks in embedded systems through scheduling
-
Article 20
-
T. Xie, and X. Qin Improving security for periodic tasks in embedded systems through scheduling ACM Trans. Embed. Comput. Syst. 6 3 2007 1 19 Article 20
-
(2007)
ACM Trans. Embed. Comput. Syst.
, vol.6
, Issue.3
, pp. 1-19
-
-
Xie, T.1
Qin, X.2
-
4
-
-
62449110159
-
Static security optimization for real-time systems
-
M. Lin, L.T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu Static security optimization for real-time systems IEEE Trans. Ind. Inform. 5 1 2009 22 37
-
(2009)
IEEE Trans. Ind. Inform.
, vol.5
, Issue.1
, pp. 22-37
-
-
Lin, M.1
Yang, L.T.2
Qin, X.3
Zheng, N.4
Wu, Z.5
Qiu, M.6
-
5
-
-
33645215766
-
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
-
Z. Shao, C. Xue, Q. Zhuge, M. Qiu, B. Xiao, and E.H.-M. Sha Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software IEEE Trans. Comput. 55 4 2006 443 453
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.4
, pp. 443-453
-
-
Shao, Z.1
Xue, C.2
Zhuge, Q.3
Qiu, M.4
Xiao, B.5
Sha, E.H.-M.6
-
6
-
-
3042590891
-
Security protection and checking in embedded system integration against buffer overflow attacks
-
Z. Shao, C. Xue, Q. Zhuge, E. Sha, B. Xiao, Security protection and checking in embedded system integration against buffer overflow attacks, in: IEEE ITCC, 2004, pp. 409-412.
-
(2004)
IEEE ITCC
, pp. 409-412
-
-
Shao, Z.1
Xue, C.2
Zhuge, Q.3
Sha, E.4
Xiao, B.5
-
7
-
-
85014332650
-
Security in embedded systems: Design challenges
-
P. Kocher Security in embedded systems: Design challenges ACM Trans. Embed. Comput. Syst. 3 3 2004 461 491
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 461-491
-
-
Kocher, P.1
-
9
-
-
65849231067
-
Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
-
Article 25
-
M. Qiu, and E.H.-M. Sha Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems ACM Transact. Des. Automat. Electron. Syst. (TODAES) 14 2 March 2009 1 30 Article 25
-
(2009)
ACM Transact. Des. Automat. Electron. Syst. (TODAES)
, vol.14
, Issue.2
, pp. 1-30
-
-
Qiu, M.1
Sha, E.H.-M.2
-
12
-
-
33744802251
-
Scheduling security-critical real-time application on clusters
-
T. Xie, and X. Qin Scheduling security-critical real-time application on clusters IEEE Trans. Comput. 55 7 2006 864 879
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.7
, pp. 864-879
-
-
Xie, T.1
Qin, X.2
-
14
-
-
50149084761
-
A new allocation scheme for parallel applications with deadline and security constraints on cluster
-
T. Xie, X. Qin, A new allocation scheme for parallel applications with deadline and security constraints on cluster, in: Proc. of the 7th IEEE International Conference on Cluster Computing, 2005, pp. 1-10.
-
(2005)
Proc. of the 7th IEEE International Conference on Cluster Computing
, pp. 1-10
-
-
Xie, T.1
Qin, X.2
-
17
-
-
0021458524
-
Dynamic task scheduling in distributed hard real-time system
-
K. Ramamritham, and J. Stankovic Dynamic task scheduling in distributed hard real-time system IEEE Trans. Softw. 1 3 1984 65 75
-
(1984)
IEEE Trans. Softw.
, vol.1
, Issue.3
, pp. 65-75
-
-
Ramamritham, K.1
Stankovic, J.2
-
18
-
-
84947902207
-
Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
-
B. Schneier, D. Whiting, Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor, in: International Workshop Proceedings on Fast Software Encryption, 1997, pp. 242-259.
-
(1997)
International Workshop Proceedings on Fast Software Encryption
, pp. 242-259
-
-
Schneier, B.1
Whiting, D.2
-
19
-
-
84949223752
-
Weaknesses in the key scheduling algorithm of RC4
-
S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in: The 8th Annual Workshop on Selected Areas in Cryptography, 2001, pp. 1-24.
-
(2001)
The 8th Annual Workshop on Selected Areas in Cryptography
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
22
-
-
84875211657
-
-
Lingo
-
Lingo http://www.lindo.com
-
-
-
|