Sciweavers

5476 search results - page 22 / 1096
» Resettably Secure Computation
Sort
View
SAC
2008
ACM
15 years 1 months ago
Securing aspect composition
Andrew Camilleri, Lynne Blair, Geoffrey Coulson
PERCOM
2010
ACM
15 years 9 days ago
When Eco-IT meets security: Concealed network coding for multicast traffic
Alban Hessler, Takahiro Kakumaru, Dirk Westhoff
101
Voted
COMCOM
2011
14 years 8 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
GI
2009
Springer
14 years 11 months ago
Towards the impact of the operational environment on the security of e-voting
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...
IEEEARES
2007
IEEE
15 years 8 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang