Sciweavers

6348 search results - page 66 / 1270
» Extensible control architectures
Sort
View
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 4 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
151
Voted
USENIX
2004
15 years 5 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
RIDE
2002
IEEE
15 years 8 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...
74
Voted
ISCAS
2006
IEEE
77views Hardware» more  ISCAS 2006»
15 years 9 months ago
A quadrature sinusoidal oscillator with phase-preserving linear frequency control and independent static amplitude control
A Gm- C architecture for a quadrature, sinusoidal os- ± Vref cillator with instantaneous, phase-preserving, linear frequency control Peak detector and independent, static amplitud...
Dimitrios N. Loizos, Paul-Peter Sotiriadis
109
Voted
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
15 years 9 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...