Sciweavers

1737 search results - page 68 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
SIGCOMM
2009
ACM
15 years 10 months ago
Crossbow: from hardware virtualized NICs to virtualized networks
This paper describes a new architecture for achieving network virtualization using virtual NICs (VNICs) as the building blocks. The VNICs can be associated with dedicated and inde...
Sunay Tripathi, Nicolas Droux, Thirumalai Srinivas...
135
Voted
HASE
2008
IEEE
15 years 10 months ago
Using Multi-Level Security Annotations to Improve Software Assurance
Current annotation technologies suffer from poor coverage over the development process phases, limited support for the broad scope of the security requirement types and inadequate...
Eryk Kylikowski, Riccardo Scandariato, Wouter Joos...
SEUS
2009
IEEE
15 years 10 months ago
Concurrency and Communication: Lessons from the SHIM Project
Abstract. Describing parallel hardware and software is difficult, especially in an embedded setting. Five years ago, we started the shim project to address this challenge by develo...
Stephen A. Edwards
124
Voted
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 9 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
108
Voted
JCM
2007
76views more  JCM 2007»
15 years 3 months ago
Scheduling Small Packets in IPSec Multi-accelerator Based Systems
—IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these ...
Antonio Vincenzo Taddeo, Alberto Ferrante, Vincenz...