Sciweavers

1801 search results - page 270 / 361
» Implementation-Oriented Secure Architectures
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
127
Voted
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
15 years 9 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
112
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
108
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
121
Voted
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 9 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak