Sciweavers

1019 search results - page 129 / 204
» Cryptographic Design Vulnerabilities
Sort
View
INFOCOM
2002
IEEE
15 years 4 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 4 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
DAC
2010
ACM
15 years 3 months ago
Carbon nanotube correlation: promising opportunity for CNFET circuit yield enhancement
Carbon Nanotubes (CNTs) are grown using chemical synthesis, and the exact positioning and chirality of CNTs are very difficult to control. As a result, “small-width” Carbon Na...
Jie Zhang, Shashikanth Bobba, Nishant Patil, Alber...
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
15 years 3 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 3 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer