Sciweavers

3452 search results - page 577 / 691
» Secure Data Outsourcing
Sort
View
117
Voted
BIBE
2004
IEEE
107views Bioinformatics» more  BIBE 2004»
15 years 4 months ago
Fast Parallel Molecular Algorithms for DNA-based Computation: Factoring Integers
The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form...
Weng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo
FTDCS
2004
IEEE
15 years 4 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
98
Voted
GCC
2006
Springer
15 years 4 months ago
UGE4B: An Universal Grid Environment for Bioinformatics Research
Recent years, grid technology has been used widely in the fields of scientific research. In this paper, we present an universal grid environment for Bioinformatics Research (UGE4B...
Gang Chen, Yongwei Wu, Weimin Zheng
106
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 2 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
EIT
2008
IEEE
15 years 2 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno