Sciweavers

1737 search results - page 181 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
SOSP
2003
ACM
16 years 1 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
WWW
2008
ACM
16 years 5 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
164
Voted
WISEC
2009
ACM
15 years 11 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
COST
1994
Springer
127views Multimedia» more  COST 1994»
15 years 8 months ago
Support for High-Performance Multipoint Multimedia Services
Existing and upcoming distributed multimedia applications require highly diverse services to satisfy their communication needs. Service integrated communication systems should be c...
Georg Carle, Jochen H. Schiller, Claudia Schmidt
OTM
2004
Springer
15 years 10 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...