Sciweavers

8503 search results - page 303 / 1701
» Secure Software Architectures
Sort
View
CASCON
2006
100views Education» more  CASCON 2006»
15 years 6 months ago
Software architects in practice: handling requirements
Software architecture can be a critical factor in software development. Understanding what software architects do in practice is necessary to the enterprise of providing technique...
Vidya Lakshminarayanan, WenQian Liu, Charles L. Ch...
126
Voted
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 9 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
WISEC
2010
ACM
15 years 12 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
OOPSLA
2009
Springer
15 years 11 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
132
Voted
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 11 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak