Sciweavers

1801 search results - page 192 / 361
» Implementation-Oriented Secure Architectures
Sort
View
125
Voted
WICON
2008
15 years 5 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
153
Voted
HPCA
2005
IEEE
16 years 4 months ago
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of a...
Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhan...
131
Voted
IMCS
2007
77views more  IMCS 2007»
15 years 3 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
133
Voted
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 3 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
159
Voted
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 10 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron