Sciweavers

329 search results - page 3 / 66
» The Dangers of Replication and a Solution
Sort
View
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
13 years 7 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 7 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NECO
2007
70views more  NECO 2007»
13 years 5 months ago
Solution Methods for a New Class of Simple Model Neurons
Recently Izhikevich (2003) proposed a new canonical neuron model of spike generation. The model was surprisingly simple, yet able to accurately replicate the firing patterns of d...
Mark D. Humphries, Kevin N. Gurney
ICDCS
2000
IEEE
13 years 10 months ago
Understanding Replication in Databases and Distributed Systems
Replication is an area of interest to both distributed systems and databases. The solutions developed from these two perspectives are conceptually similar but differ in many aspec...
Fernando Pedone, Matthias Wiesmann, André S...
COLCOM
2007
IEEE
14 years 3 days ago
Message replication in unstructured peer-to-peer network
—Recently, unstructured peer-to-peer (P2P) applications have become extremely popular. Searching in these networks has been a hot research topic. Flooding-based searching, which ...
Osama Al-Haj Hassan, Lakshmish Ramaswamy