Sciweavers

1462 search results - page 229 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ICC
2011
IEEE
269views Communications» more  ICC 2011»
14 years 1 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
CL
2010
Springer
15 years 2 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
IACR
2011
86views more  IACR 2011»
14 years 1 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
JSAC
2011
184views more  JSAC 2011»
14 years 9 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
HPDC
1999
IEEE
15 years 6 months ago
A Network-Aware Distributed Storage Cache for Data Intensive Environments
Modern scientific computing involves organizing, moving, visualizing, and analyzing massive amounts of data at multiple sites around the world. The technologies, the middleware se...
Brian Tierney, Jason Lee, Brian Crowley, Mason Hol...