Sciweavers

5234 search results - page 852 / 1047
» Simulation of Computer Network Attacks
Sort
View
JCP
2008
119views more  JCP 2008»
15 years 4 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
SACMAT
2010
ACM
15 years 2 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
INFOCOM
2011
IEEE
14 years 7 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
136
Voted
MICCAI
2003
Springer
16 years 5 months ago
Vascular Atlas Formation Using a Vessel-to-Image Affine Registration Method
We have developed a method for forming vascular atlases using vascular distance maps and a novel vascular model-to-image registration method. Our atlas formation process begins wit...
Dini Chillet, Julien Jomier, Derek Cool, Stephen R...
PERCOM
2009
ACM
16 years 4 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...