Sciweavers

1469 search results - page 179 / 294
» Design and Implementation of Software Objects in Hardware
Sort
View
IACR
2011
192views more  IACR 2011»
13 years 9 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
TGIS
2002
118views more  TGIS 2002»
14 years 9 months ago
A Dynamic Architecture for Distributing Geographic Information Services
Traditional GISystems are no longer appropriate for modern distributed, heterogeneous network environments due to their closed architecture, and their lack of interoperability, reu...
Ming-Hsiang Tsou, Barbara P. Buttenfield
CHARME
2001
Springer
133views Hardware» more  CHARME 2001»
15 years 2 months ago
View from the Fringe of the Fringe
Formal analysis remains outside the mainstream of system design practice. Interactive methods and tools are regarded by some to be on the margin of useful research in this area. Al...
Steven D. Johnson
MICRO
2003
IEEE
258views Hardware» more  MICRO 2003»
15 years 3 months ago
LLVA: A Low-level Virtual Instruction Set Architecture
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...
SOSP
2003
ACM
15 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...