Sciweavers

Share
188 search results - page 38 / 38
» Virtualized in-cloud security services for mobile devices
Sort
View
MSWIM
2005
ACM
12 years 9 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
LCTRTS
2009
Springer
12 years 10 months ago
Addressing the challenges of DBT for the ARM architecture
Dynamic binary translation (DBT) can provide security, virtualization, resource management and other desirable services to embedded systems. Although DBT has many beneļ¬ts, its r...
Ryan W. Moore, José Baiocchi, Bruce R. Chil...
USENIX
2003
12 years 4 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
books