Sciweavers

418 search results - page 41 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
SP
2008
IEEE
13 years 7 months ago
Predictable Design of Network-Based Covert Communication Systems
This paper presents a predictable and quantifiable approach to designing a covert communication system capable of effectively exploiting covert channels found in the various layer...
Ronald William Smith, George Scott Knight
SAFECOMP
2005
Springer
14 years 1 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
13 years 11 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
SRDS
2003
IEEE
14 years 26 days ago
Coordinated Forward Error Recovery for Composite Web Services
This paper proposes a solution based on forward error recovery, oriented towards providing dependability of composite Web services. While exploiting their possible support for fau...
Ferda Tartanoglu, Valérie Issarny, Alexande...
VTS
2006
IEEE
102views Hardware» more  VTS 2006»
14 years 1 months ago
Energy Efficient Software-Based Self-Test for Wireless Sensor Network Nodes
We consider self-testing of complete wireless nodes in the field through a low-energy software-based selftest (SBST) method. Energy consumption is optimized both for individual co...
Rong Zhang, Zeljko Zilic, Katarzyna Radecka