Sciweavers

2081 search results - page 96 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Algorithms for Low-Latency Remote File Synchronization
The remote file synchronization problem is how to update an outdated version of a file located on one machine to the current version located on another machine with a minimal am...
Hao Yan, Utku Irmak, Torsten Suel
SEC
2004
15 years 5 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi
ACMSE
2006
ACM
15 years 6 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
CODES
2007
IEEE
15 years 10 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 4 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...