Sciweavers

1801 search results - page 281 / 361
» Implementation-Oriented Secure Architectures
Sort
View
126
Voted
WIKIS
2009
ACM
15 years 10 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
15 years 10 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
159
Voted
ISCAS
2008
IEEE
127views Hardware» more  ISCAS 2008»
15 years 10 months ago
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection
— ICEBERG is a block cipher that has been recently proposed for security applications requiring efficient FPGA implementations. In this paper, we investigate a compact ASIC imple...
Huiju Cheng, Howard M. Heys
133
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
126
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Bloom Filter Accelerator for String Matching
— In this paper we present a hardware architecture for string matching. Our solution based on using a Bloom filter based pre-processor and a parallelized hashing engine is capab...
M. Nourani, P. Katta