Sciweavers

2281 search results - page 314 / 457
» Security Patterns and Secure Systems Design
Sort
View
SAFECOMP
2009
Springer
15 years 10 months ago
Establishing a Framework for Dynamic Risk Management in 'Intelligent' Aero-Engine Control
The behaviour of control functions in safety critical software systems is typically bounded to prevent the occurrence of known system level hazards. These bounds are typically deri...
Zeshan Kurd, Tim Kelly, John A. McDermid, Radu Cal...
ICMCS
2007
IEEE
118views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Cascading Multimodal Verification using Face, Voice and Iris Information
In this paper we propose a novel fusion strategy which fuses information from multiple physical traits via a cascading verification process. In the proposed system users are veri...
Ping-Han Lee, Lu-Jong Chu, Yi-Ping Hung, Sheng-Wen...
WISA
2007
Springer
15 years 10 months ago
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
We propose a compact architecture of a Montgomery elliptic curve scalar multiplier in a projective coordinate system over GF(2m ). To minimize the gate area of the architecture, we...
Yong Ki Lee, Ingrid Verbauwhede
130
Voted
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
15 years 9 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
VIZSEC
2005
Springer
15 years 9 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...