Sciweavers

1801 search results - page 84 / 361
» Implementation-Oriented Secure Architectures
Sort
View
IJNSEC
2007
137views more  IJNSEC 2007»
13 years 8 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram
SAFECOMP
1998
Springer
14 years 8 days ago
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture
By-wire systems have been established for several years in the area of aircraft construction and there are now approaches to utilize this technology in vehicles. The required elect...
Thomas Ringler, J. Steiner, R. Belschner, Bernd He...
TRUSTBUS
2007
Springer
14 years 2 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
AGENTS
2000
Springer
14 years 13 days ago
An Architecture for Modeling Internet-Based Collaborative Agent Systems
Abstract. This paper describes an architecture for modeling cooperating systems of communicating agents. The authors’ goal is not that of providing a framework to implement multi...
Roberto A. Flores, Robert C. Kremer, Douglas H. No...
CCS
2007
ACM
14 years 2 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...