Sciweavers

1801 search results - page 2 / 361
» Memory-Centric Security Architecture
Sort
View
DRMTICS
2005
Springer
13 years 6 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
CAINE
2003
13 years 6 months ago
A Unified Architecture for the Implementation of Security Protocols
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Ibrahim S. Abdullah, Daniel A. Menascé
CCS
2006
ACM
13 years 8 months ago
Is risk a good security metric?
Why measuring security? To make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during d...
O. Sami Saydjari
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 4 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis