Sciweavers

831 search results - page 147 / 167
» A Security Concept for OLAP
Sort
View
FPL
2008
Springer
105views Hardware» more  FPL 2008»
13 years 10 months ago
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confidentiality and authenticity of FPGA bitstreams. In DPR syst...
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji T...
DIMVA
2007
13 years 10 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
ITSL
2008
13 years 10 months ago
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact
In this paper we present a randomized complexity theoretic model for those epidemics propagated via short-distance close contact. We prove that the contact-based epidemics problems...
Zhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu
ERSA
2006
102views Hardware» more  ERSA 2006»
13 years 10 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
IADIS
2004
13 years 10 months ago
Design issues and managing method of integrated gateway system for mobile internet service
IMT-2000 has been developing in both cdma2000 and W-CDMA, and their convergence or harmonization has also been discussed in several standard organizations. Besides the most expert...
Soon-Choul Kim, Jae-Hong Ryu, Won Ryu