Sciweavers

6164 search results - page 1130 / 1233
» Teaching Computer Security
Sort
View
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 9 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
ESCIENCE
2005
IEEE
15 years 9 months ago
Experiences with GRIA - Industrial Applications on a Web Services Grid
The GRIA project set out to make the Grid usable by industry. The GRIA middleware is based on Web Services, and designed to meet the needs of industry for security and business-to...
Mike Surridge, Steve Taylor, David De Roure, Ed Za...
GLVLSI
2005
IEEE
85views VLSI» more  GLVLSI 2005»
15 years 9 months ago
VLSI CAD tool protection by birthmarking design solutions
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Lin Yuan, Gang Qu, Ankur Srivastava
134
Voted
ICITA
2005
IEEE
15 years 9 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ICNP
2005
IEEE
15 years 9 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
« Prev « First page 1130 / 1233 Last » Next »