Sciweavers

2162 search results - page 382 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
14 years 4 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
IPPS
2005
IEEE
14 years 3 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...
MSWIM
2004
ACM
14 years 3 months ago
An enhanced HCF for IEEE 802.11e wireless networks
In this paper the behavior of the upcoming MAC protocol for wireless LANs IEEE 802.11e is investigated. Based on the results, we propose an enhancement for Hybrid Coordination Fun...
Balasubramanian Appiah Venkatakrishnan, S. Selvake...
ACISP
2004
Springer
14 years 3 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
ICRA
2002
IEEE
181views Robotics» more  ICRA 2002»
14 years 2 months ago
The BlueDRAGON - A System for Measuring the Kinematics and the Dynamics of Minimally Invasive Surgical Tools In-Vivo
Minimally invasive surgery (MIS) involves a multidimensional series of tasks requiring a synthesis between visual information and the kinematics and dynamics of the surgical tools...
Jacob Rosen, Jeffrey D. Brown, Lily Chang, Marco B...