Sciweavers

4820 search results - page 207 / 964
» Implementing Signatures for C
Sort
View
HOTI
2005
IEEE
15 years 9 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
QSIC
2005
IEEE
15 years 9 months ago
Runtime Validation of Behavioural Contracts for Component Software
In component software, the independence of components is achieved by separating their interfaces from implementations. The interface definition of a component serves as the contr...
Yan Jin, Jun Han
SIGMOD
2005
ACM
89views Database» more  SIGMOD 2005»
15 years 9 months ago
Stacked indexed views in microsoft SQL server
Appropriately selected materialized views (also called indexed views) can speed up query execution by orders of magnitude. Most database systems limit support for materialized vie...
David DeHaan, Per-Åke Larson, Jingren Zhou
ISPEC
2005
Springer
15 years 8 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 8 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya