Sciweavers

1801 search results - page 15 / 361
» Implementation-Oriented Secure Architectures
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 6 months ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...
VTC
2010
IEEE
114views Communications» more  VTC 2010»
13 years 5 months ago
A Secure Multi-Application Platform for Vehicle Telematics
Contemporary vehicles offer an advanced telematics platform with multiple applications available such as electronic road tolling, emergency call, breakdown call, or route planning....
Jef Maerien, Sam Michiels, Stefan Van Baelen, Chri...
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
FI
2011
96views more  FI 2011»
13 years 2 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
ANCS
2009
ACM
13 years 5 months ago
SANS: a scalable architecture for network intrusion prevention with stateful frontend
Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analy...
Fei He, Yaxuan Qi, Yibo Xue, Jun Li