Sciweavers

6555 search results - page 1109 / 1311
» Secure attribute-based systems
Sort
View
137
Voted
RAID
2010
Springer
15 years 1 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
150
Voted
SIGOPS
2010
272views more  SIGOPS 2010»
15 years 1 months ago
The Akamai network: a platform for high-performance internet applications
Comprising more than 61,000 servers located across nearly 1,000 networks in 70 countries worldwide, the Akamai platform delivers hundreds of billions of Internet interactions dail...
Erik Nygren, Ramesh K. Sitaraman, Jennifer Sun
177
Voted
CASES
2010
ACM
15 years 1 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
137
Voted
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 1 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
137
Voted
OPODIS
2010
15 years 1 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas
« Prev « First page 1109 / 1311 Last » Next »