Sciweavers

438 search results - page 42 / 88
» Defending Critical Infrastructure
Sort
View
ADHOCNOW
2006
Springer
14 years 2 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau
EUROMICRO
2005
IEEE
14 years 2 months ago
RSerPool - Providing Highly Available Services using Unreliable Servers
The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by mechanisms an...
Thomas Dreibholz, Erwin P. Rathgeb
NCA
2005
IEEE
14 years 2 months ago
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead. Especially in ...
Gunnar Gaubatz, Berk Sunar
DIGRA
2005
Springer
14 years 2 months ago
Architecting Scalability for Massively Multiplayer Online Gaming Experiences
In this study, the authors propose to discuss scalability challenges posed by Massively Multiplayer Online Game (MMOG) scenarios, while outlining issues specific to the context of...
Rui Gil, José Tavares, Licinio Roque
ESORICS
2005
Springer
14 years 2 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld