Sciweavers

5107 search results - page 173 / 1022
» Design Issue Of ECTST
Sort
View
IAW
2003
IEEE
15 years 3 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
70
Voted
FPL
2003
Springer
144views Hardware» more  FPL 2003»
15 years 3 months ago
FPGA Implementations of Neural Networks - A Survey of a Decade of Progress
The first successful FPGA implementation [1] of artificial neural networks (ANNs) was published a little over a decade ago. It is timely to review the progress that has been made i...
Jihan Zhu, Peter Sutton
65
Voted
CHES
2001
Springer
59views Cryptology» more  CHES 2001»
15 years 2 months ago
Transparent Harddisk Encryption
This paper introduces a new block cipher, and discusses its security. Its design is optimized for high-bandwidth applications that do not have high requirements on key-schedule lat...
Thomas Pornin
RAID
2001
Springer
15 years 2 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
70
Voted
ECWEB
2000
Springer
103views ECommerce» more  ECWEB 2000»
15 years 2 months ago
Security of Electronic Business Applications - Structure and Quantification
: Internet based business leads to new challenges for Information Security with trust building and partner protection as the most important issues. This article gives an overview o...
Konstantin Knorr, Susanne Röhrig