Sciweavers

8503 search results - page 1350 / 1701
» Secure Software Architectures
Sort
View
145
Voted
FC
2000
Springer
127views Cryptology» more  FC 2000»
15 years 7 months ago
Blind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures. Here we de ne the primitive of blind auditable membership proof" BAMP which combines public auditab...
Tomas Sander, Amnon Ta-Shma, Moti Yung
COLCOM
2009
IEEE
15 years 7 months ago
VaaS: Videoconference as a service
- Internet is a place nowadays where interoperating services are offered which can be integrated or mashed up in order to fulfill user demands. This paper proposes a way to offer v...
Pedro Rodriguez, Daniel Gallego, Javier Cervino, F...
103
Voted
ASPDAC
2008
ACM
126views Hardware» more  ASPDAC 2008»
15 years 5 months ago
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem
Since 2001, there have been a myriad of papers on systematic analysis of Multi-Processor System on Chip (MPSoC) and Network on Chip (NoC). Nevertheless, we only have a few of their...
Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Ch...
156
Voted
AUTONOMICS
2008
ACM
15 years 5 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 5 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
« Prev « First page 1350 / 1701 Last » Next »