Sciweavers

623 search results - page 31 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
140
Voted
IPPS
2008
IEEE
15 years 10 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
177
Voted
CODES
2002
IEEE
15 years 8 months ago
Hardware support for real-time embedded multiprocessor system-on-a-chip memory management
The aggressive evolution of the semiconductor industry — smaller process geometries, higher densities, and greater chip complexity — has provided design engineers the means to...
Mohamed Shalan, Vincent John Mooney III
110
Voted
CN
2007
141views more  CN 2007»
15 years 3 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
163
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Security requirements in service oriented architectures for ubiquitous computing
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Domenico Cotroneo, Almerindo Graziano, Stefano Rus...
114
Voted
DATE
2008
IEEE
140views Hardware» more  DATE 2008»
15 years 10 months ago
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed i...
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid ...