Sciweavers

1801 search results - page 352 / 361
» Implementation-Oriented Secure Architectures
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
IISWC
2008
IEEE
14 years 3 months ago
On the representativeness of embedded Java benchmarks
— Java has become one of the predominant languages for embedded and mobile platforms due to its architecturally neutral design, portability, and security. But Java execution in t...
Ciji Isen, Lizy Kurian John, Jung Pil Choi, Hyo Ju...
INFOCOM
2008
IEEE
14 years 3 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
CISS
2007
IEEE
14 years 3 months ago
Coherent Optical CDMA with low MAI
Abstract. Spectrally phase-coded optical code division multiple access (OCDMA), demodulated with phase and polarization diversity devices, exhibits high spectral efficiency and low...
A. Brinton Cooper, Jacob B. Khurgin, Shuangmei Xu,...
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
14 years 3 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima