Sciweavers

134 search results - page 23 / 27
» Designing an Integrated Architecture for Network Content Sec...
Sort
View
ICISC
2008
129views Cryptology» more  ICISC 2008»
13 years 8 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
CCR
2007
135views more  CCR 2007»
13 years 7 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
ACMSE
2009
ACM
14 years 1 months ago
The effects of network delay on task performance in a visual-haptic collaborative environment
Computer networks have grown considerably over the past decade. Faster and cheaper Internet connections have brought millions of PCs into a domain where rich content and fast down...
Benjamin M. Lambeth, James LaPlant, Elena Clapan, ...
SOSP
2003
ACM
14 years 4 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
APNOMS
2006
Springer
13 years 11 months ago
A Framework Supporting Quality of Service for SOA-Based Applications
Web Services and Service-Oriented Architecture (SOA) has been playing an important role as a middleware for interoperable transactions such as Business-to-Business and Enterprise A...
Phung Huu Phu, Dae Seung Yoo, Myeongjae Yi