Sciweavers

172 search results - page 3 / 35
» Architectural support for software-based protection
Sort
View
75
Voted
INFOCOM
2006
IEEE
15 years 3 months ago
Path Protection Routing with SRLG Constraints to Support IPTV in WDM Mesh Networks
— The distribution of broadcast TV across large provider networks has become a highly topical subject as satellite distribution capacity exhausts and competitive pressures increa...
Meeyoung Cha, Wanpracha Art Chaovalitwongse, Zihui...
CODES
2007
IEEE
15 years 3 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
TRUST
2010
Springer
15 years 2 months ago
Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture
Virtualization has been purported to be a panacea for many security problems. We analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardw...
Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leend...
85
Voted
HIPEAC
2005
Springer
15 years 3 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi
104
Voted
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu