Sciweavers

6689 search results - page 1245 / 1338
» A Network Security Monitor
Sort
View
SIGUCCS
2000
ACM
14 years 2 months ago
Windows 2000 Deployment Technical Challenges at the University of Colorado at Boulder
Microsoft Windows 2000 represents a major change in desktop and network operating systems. This latest Windows operating system includes many new features and technologies that wi...
Brad Judy, Alfred Roberts, David Bodnar
AINA
2008
IEEE
14 years 1 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
APNOMS
2008
Springer
14 years 1 months ago
Towards Management Requirements of Future Internet
The Internet is one of the most successful modern technologies; we cannot imagine what our lives would be without the Internet. Despite the huge success of the Internet, many probl...
Sung-Su Kim, Mi-Jung Choi, Hong-Taek Ju, Masayoshi...
ASPDAC
2008
ACM
126views Hardware» more  ASPDAC 2008»
14 years 1 months ago
A Multi-Processor NoC platform applied on the 802.11i TKIP cryptosystem
Since 2001, there have been a myriad of papers on systematic analysis of Multi-Processor System on Chip (MPSoC) and Network on Chip (NoC). Nevertheless, we only have a few of their...
Jung-Ho Lee, Sung-Rok Yoon, Kwang-Eui Pyun, Sin-Ch...
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 1 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
« Prev « First page 1245 / 1338 Last » Next »