Sciweavers

1627 search results - page 144 / 326
» High Security Smartcards
Sort
View
140
Voted
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 8 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
ESORICS
2000
Springer
15 years 8 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
142
Voted
CMS
2003
148views Communications» more  CMS 2003»
15 years 6 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
215
Voted
ISJGP
2010
15 years 1 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 10 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...