Sciweavers

5665 search results - page 260 / 1133
» Introduction to Computer Security
Sort
View
JDCTA
2008
74views more  JDCTA 2008»
13 years 10 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
12 years 10 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
ACSAC
2000
IEEE
14 years 3 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
EUROMICRO
2009
IEEE
14 years 2 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
BROADNETS
2007
IEEE
14 years 5 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy