Sciweavers

526 search results - page 13 / 106
» Increase honeypot security through data analysis
Sort
View
PDP
2010
IEEE
15 years 2 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
JCM
2007
113views more  JCM 2007»
14 years 9 months ago
Reinventing Healthcare Service through M-care Business Model: The Strategy Analysis of WiMAX Adoption
—To address the emerging issues of aging society, new technology creates many opportunities to solve the problem of care service and increases added-value in the digital family. ...
Paul T. Y. Tseng, Huei-Huang Chen
ICIP
2010
IEEE
14 years 7 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
ICALP
2005
Springer
15 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos