×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [29]
内容类型
会议论文 [22]
期刊论文 [7]
发表日期
2019 [3]
2018 [12]
2017 [4]
2016 [5]
2015 [1]
2014 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共29条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
Hardware-Enhanced Protection for the Runtime Data Security in Embedded Systems
期刊论文
ELECTRONICS, 2019, 卷号: 8
作者:
Wang, Weike
;
Zhang, Xiaobing
;
Hao, Qiang
;
Zhang, Zhun
;
Xu, Bin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
embedded system
data security
confidentiality
integrity
hardware-enhanced protection
A PCA and Mahalanobis distance-based detection method for logical hardware Trojan
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:
Huang, Jiaoying
;
Yang, Daming
;
Gao, Cheng
;
Fu, Chengcheng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
detection methods
hardware security
hardware trojans
side-channel analysis
NEM: A NEW in-VM monitoring with high efficiency and strong isolation
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 396-405
作者:
Qin, J.
;
Shi, B.
;
Li, B.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Efficiency
Network security
Semantics
Switching
Virtual reality
Virtualization
Application scenario
Context switching
Hardware virtualization
Security requirements
Virtual exception
Virtual machine monitors
Virtualization securities
VMFUNC
Virtual machine
A novel security validation in embedded system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Li, L.
;
Du, P.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Hardware
Hardware security
Intrusion detection
Program compilers
execution behavior
Experimental analysis
Hardware-assisted
Memory access validations
Performance penalties
Response mechanisms
secure tag
Software vulnerabilities
Embedded systems
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Guan, Z.
;
Li, Y.
;
Shang, T.
;
Liu, J.
;
Sun, M.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cryptography
Economic and social effects
Field programmable gate arrays (FPGA)
Hardware
Intellectual property core
Internet protocols
Machine design
Robotics
Robots
Speed
Wireless telecommunication systems
Block cipher algorithms
Hardware schemes
Resource utilizations
Security
Trade off
Trade-off analysis
Upper and lower bounds
Wireless communications
Network security
Design and sopc-based realization of a video chaotic secure communication scheme
期刊论文
International Journal of Bifurcation and Chaos, 2018, 卷号: 28
作者:
Chen, P.
;
Yu, S.
;
Chen, B.
;
Xiao, L.
;
Lu, J.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Cryptography
Field programmable gate arrays (FPGA)
Hardware
Security systems
Anticontrol
Chaotic secure communications
Hardware realization
Programmable chips
Real time performance
Security analysis
SOPC-based realization
Video encryption
Integrated circuit design
Utilizing Hypervisor to Enhance TrustZone's Introspection Capabilities on Non-Secure World [借助Hypervisor 强化TrustZone 对非安全世界的监控能力]
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2018, 卷号: 29, 页码: 2511-2526
作者:
Zhang, Z.-K.
;
Li, Z.-J.
;
Xia, C.-H.
;
Ma, J.-X.
;
Cui, J.-H.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Access control
Android (operating system)
Hardware
Memory architecture
Telephone sets
Virtualization
Android systems
Control capabilities
Hardware resources
Hypervisor
Introspection system
Memory management
Security protection
TrustZone
Mobile security
Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic
会议论文
MATEC Web of Conferences
作者:
Wang, W.
;
Wang, X.
;
Du, P.
;
Tian, Y.
;
Zhang, X.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Computer circuits
Cryptography
Engines
Hardware
Hardware security
Network security
Programmable logic controllers
System-on-chip
Composite field arithmetics
Cryptographic engines
Encryption and decryption
Hardware implementations
Memory encryption
Proposed architectures
Protection methods
Resource consumption
Embedded systems
An Optimized Method of Hardware Implementation for LHash in the Embedded System
会议论文
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018-01-01
作者:
Wang, Xiang
;
Tian, Yuntong
;
Du, Pei
;
Zhang, Xiaobing
;
Wang, Weike
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/12/30
embedded system
lightweight
hash function
hardware implementation
security
©版权所有 ©2017 CSpace - Powered by
CSpace