Sciweavers

713 search results - page 103 / 143
» An Integrated Framework for Security and Dependability
Sort
View
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
13 years 10 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ASPLOS
2008
ACM
13 years 10 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
GRID
2007
Springer
14 years 2 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson
ATAL
2004
Springer
14 years 1 months ago
Naming Services in Multi-Agent Systems: A Design for Agent-Based White Pages
Distributed multi-agent systems require naming services to locate and communicate with remote agents. In this paper we focus on the design and implementation of the “White Pages...
Todd Wright
ICNP
2007
IEEE
14 years 2 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik