Embedded processor security
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardware-only context. Security-tagged data allows each datum to be properly manipulated with a predictable assurance. This paper addresses the...
Main Authors: | d'Auriol, Brian J., Pathan, Al-Sakib Khan |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2007
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/ http://irep.iium.edu.my/709/1/Print-SAM2007.pdf |
Similar Items
-
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010) -
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008) -
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008) -
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011) -
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)