Sciweavers

14824 search results - page 2715 / 2965
» Security - Introduction
Sort
View
COMPSEC
2008
116views more  COMPSEC 2008»
15 years 3 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 3 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
CORR
2010
Springer
159views Education» more  CORR 2010»
15 years 3 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 3 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
CORR
2010
Springer
176views Education» more  CORR 2010»
15 years 3 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...
« Prev « First page 2715 / 2965 Last » Next »