Sciweavers

739 search results - page 120 / 148
» Security Challenges in Cloud Computing
Sort
View
ANCS
2006
ACM
15 years 5 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
GRID
2004
Springer
15 years 7 months ago
Distributed Ant: A System to Support Application Deployment in the Grid
e-Science has much to benefit from the emerging field of grid computing. However, construction of e-Science grids is a complex and inefficient undertaking. In particular, deployme...
Wojtek Goscinski, David Abramson
CORR
2010
Springer
159views Education» more  CORR 2010»
15 years 2 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
95
Voted
ML
2006
ACM
15 years 7 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
ISI
2008
Springer
15 years 1 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham