Sciweavers

241 search results - page 40 / 49
» Secure Remote Control of Field-programmable Network Devices
Sort
View
72
Voted
WSCG
2000
97views more  WSCG 2000»
14 years 11 months ago
Human Movement Instruction System that Utilizes Avatar Overlays Using Stereoscopic Images
In the Mixed Reality environment that combines the real world and the virtual world it is important to control the 'place' that comprises both real and virtual objects. ...
Masayuki Ihara, Yoshihiro Shimada, Kenichi Kida, S...
86
Voted
PET
2010
Springer
15 years 1 months ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
ANCS
2008
ACM
14 years 11 months ago
Implementing an OpenFlow switch on the NetFPGA platform
We describe the implementation of an OpenFlow Switch on the NetFPGA platform. OpenFlow is a way to deploy experimental or new protocols in networks that carry production traffic. ...
Jad Naous, David Erickson, G. Adam Covington, Guid...
DSOM
2003
Springer
15 years 2 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
ICETE
2004
204views Business» more  ICETE 2004»
14 years 11 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson