Conferences related to Secure storage

Back to Top

2021 IEEE/MTT-S International Microwave Symposium - IMS 2021

The IEEE MTT-S International Microwave Symposium (IMS) is the premier conference covering basic technologies, to passives and actives components to system over a wide range of frequencies including VHF, UHF, RF, microwave, millimeter-wave, terahertz, and optical. The conference will encompass the latest in RFIC, MIC, MEMS and filter technologies, advances in CAD, modeling, EM simulation, wireless systems, RFID and related topics.

  • 2029 IEEE/MTT-S International Microwave Symposium - IMS 2029

    The IEEE International Microwave Symposium (IMS) is the world s foremost conference covering the UHF, RF, wireless, microwave, millimeter-wave, terahertz, and optical frequencies; encompassing everything from basic technologies to components to systems including the latest RFIC, MIC, MEMS and filter technologies, advances in CAD, modeling, EM simulation and more. The IMS includes technical and interactive sessions, exhibits, student competitions, panels, workshops, tutorials, and networking events.


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


More Conferences

Periodicals related to Secure storage

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Architecture Letters

Rigorously peer-reviewed forum for publishing early, high-impact results in the areas of uni- and multiprocessors computer systems, computer architecture workload characterization, performance evaluation and simulation techniques, and power-aware computing


More Periodicals

Most published Xplore authors for Secure storage

Back to Top

Xplore Articles related to Secure storage

Back to Top

Designing Serial EEPROMS Into Microcontroller Systems

Electro International, 1991, 1991

Serial EEPROM devices are finding their way into more and more microcontroller applications. Almost any microcontroller system can find a use for EEPROM to store necessary software parameters or to provide read/write flexibility to the product. For the most part, semiconductor manufacturers have not found cost effective means for processing EEPROM on the same chip as the microcontroller. As a ...


National Supercomputing Center mass storage system requirements

[1991] Digest of Papers Eleventh IEEE Symposium on Mass Storage Systems, 1991

As part of the National Supercomputing Center effort to define mass storage requirements and directions, six national centers were asked to fill out a questionnaire on the topic. Mass storage system requirements deemed significant by the respondents are presented.<<ETX>>


A Secure Storage Service in the Hybrid Cloud

2011 Fourth IEEE International Conference on Utility and Cloud Computing, 2011

Cloud storage services are not secure by nature. There is an inherent risk of (a) data exposure (confidentiality), (b) data tampering (integrity) and (c) denial of access to data (availability). We provide a service-oriented solution for provisioning secure storage service in the hybrid cloud environment, called Trust Store. The system is suitable to facilitate individual as well as collaborative data ...


Bridging the Missing Link of Cloud Data Storage Security in AWS

2010 7th IEEE Consumer Communications and Networking Conference, 2010

The data that is stored and/or transmitted on the Internet has been called "the blood of the IT". Along with the infrastructure and network based applications, data storage has been recognized as one of the major dimensions of information technology. The prosperity of Cloud Computing requires the moving from server-attached storage to distributed storage. Along with variant advantages, the distributed ...


A security-enhanced key authorization management scheme for trusted computing platform

2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012

Secure storage is one of the important functionalities in trusted computing platform. The key management is one of the important technologies in secure storage. There is a key synchronization problem in the existing trusted key authorization management mechanism for Trusted Computing Platform. To solve the problem, we propose a security-enhanced trusted key authorization management scheme. The new scheme can effectively ...


More Xplore Articles

Educational Resources on Secure storage

Back to Top

IEEE-USA E-Books

  • Designing Serial EEPROMS Into Microcontroller Systems

    Serial EEPROM devices are finding their way into more and more microcontroller applications. Almost any microcontroller system can find a use for EEPROM to store necessary software parameters or to provide read/write flexibility to the product. For the most part, semiconductor manufacturers have not found cost effective means for processing EEPROM on the same chip as the microcontroller. As a result semiconductor manufacturers such as National Semiconductor and ICT have developed families of low density serial EEPROMs targeted for use in microcontroller applications. The serial EEPROM provides microcontroller system designers with a simple interface to accessing small amounts of nonvolatile memory with virtually no sacrifice to board space.

  • National Supercomputing Center mass storage system requirements

    As part of the National Supercomputing Center effort to define mass storage requirements and directions, six national centers were asked to fill out a questionnaire on the topic. Mass storage system requirements deemed significant by the respondents are presented.<<ETX>>

  • A Secure Storage Service in the Hybrid Cloud

    Cloud storage services are not secure by nature. There is an inherent risk of (a) data exposure (confidentiality), (b) data tampering (integrity) and (c) denial of access to data (availability). We provide a service-oriented solution for provisioning secure storage service in the hybrid cloud environment, called Trust Store. The system is suitable to facilitate individual as well as collaborative data storage and access. In this demonstration, we show how Trust Store can be used to store and retrieve files securely in the hybrid cloud environments.

  • Bridging the Missing Link of Cloud Data Storage Security in AWS

    The data that is stored and/or transmitted on the Internet has been called "the blood of the IT". Along with the infrastructure and network based applications, data storage has been recognized as one of the major dimensions of information technology. The prosperity of Cloud Computing requires the moving from server-attached storage to distributed storage. Along with variant advantages, the distributed storage also poses new challenges in creating a secure and reliable data storage and access facility over insecure or unreliable service providers. The security of data stored in the cloud is one of the challenges to be addressed before the novel pay-as-you-go business model is applied widely. In this research, we revealed the vulnerability in the Amazon's AWS cloud and discussed technical approaches towards potential effective solutions.

  • A security-enhanced key authorization management scheme for trusted computing platform

    Secure storage is one of the important functionalities in trusted computing platform. The key management is one of the important technologies in secure storage. There is a key synchronization problem in the existing trusted key authorization management mechanism for Trusted Computing Platform. To solve the problem, we propose a security-enhanced trusted key authorization management scheme. The new scheme can effectively enhance the trust and security of the trusted storage through adding child key information in parent key.

  • A facility scheme of implementation of RAID with ATA disks

    Though ATA protocol is a simple, unintelligent data transfer protocol, and the orientation of its devices are the low-end market, these are the very key points which make it possible to facilitate the implementation of RAID with ATA disks. In this paper, we proposed a scheme of implementing a simple ATA RAID which is called handy RAID, and in the end of the article there are our experimentation measure results.

  • Analysis of error correcting codes for the secure storage of biometric templates

    Error Correcting Codes (ECCs) are widely used today in combination with cryptographic hash functions in the design of biometric systems with secure template storage. The selected ECC strongly influences the performance of the system in terms of False Rejection Rate (FRR) and False Acceptance Rate (FAR) and, therefore, the choice of the code must be done very carefully. This paper presents an analysis of the ECC properties which affect the security and recognition performance of biometric systems, taking as starting point the genuine and impostor normalized Hamming Distance (HD) distributions resulting from intra- and inter-class comparisons. To illustrate the ECC properties relevant for this discussion, the performance of a secure iris verification system is studied. The ECC codes selected for testing are Low-Density Parity Check (LDPC) and Reed Solomon (RS) codes, since these are two of the most commonly used ECCs for secure biometric template storage systems and they have very different properties, which allows testing under a wide range of conditions.

  • Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing

    In perfect secret sharing schemes, invalid coalitions of shares do not reveal any information regarding the secret. However, in secret sharing constructions which are non-perfect in nature, every illegitimate coalition leaks out information not just pertaining to the parent secret but also related to other shares in circulation. In this paper the information flow and leakage through shares generated by a non-perfect scheme called MIX-SPLIT is examined with the help of a geometric model, developed with a 3-out-of-3 sharing example in view. Finally the principle of controlled leakage has been applied towards a secure biometric-based group authentication system. No fingerprint template storage is required and access to the respective user biometric PINs are made completely secure.

  • T-Box: Tamper-resistant vehicle data collection system for a networked digital tachograph

    With the widespread deployment of digital tachograph, an ability to record the driving data in a tamper-resistant manner has become a critical issue. The installation of the digital tachograph has been mandatory for all business vehicles in Korea since 2012. As its next step, a networked digital tachograph has been developed for real-time monitoring of the driving time, breaks, as well as rest periods undertaken by a driver. In this paper, we propose a tamper-resistant logging system for the networked digital tachograph, called T-Box. To provide the tamper-resistant logging, we devised a TPM-based logging mechanism in which even the drivers cannot modify or falsify the driving data.

  • Study of management interface for cluster system integrity

    Cluster system can be considered as a solution when high performance system is deployed because cluster system can provide the high performance, mass storage, scalability and so on with relative low cost in comparison with super computer system. For the trusted service against various malicious attacks, the trusted operational environment is very critical in order to guarantee that their services are not compromised and then secure. This can be done by providing the integrity with cluster system. Since most of cluster system consists of many nodes, the user interface is needed for the efficient and convenient management. This paper introduces the management interface for cluster system integrity. The management interface manages the booting status of each cluster node and the integrity of software to be provisioned. Management interface consists of management agent that interacts with each node to request and receive management information and Web-based GUI interface for cluster manager. The manager can manage the integrity of cluster system conveniently and efficiently in a consistent way with this interface.



Standards related to Secure storage

Back to Top

No standards are currently tagged "Secure storage"


Jobs related to Secure storage

Back to Top