Sciweavers

215 search results - page 38 / 43
» Key Management for Encrypted broadcast
Sort
View
IPPS
2005
IEEE
14 years 1 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood
ATAL
2005
Springer
14 years 1 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
JCM
2007
191views more  JCM 2007»
13 years 7 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
LCN
2005
IEEE
14 years 1 months ago
Automated Traffic Classification and Application Identification using Machine Learning
The dynamic classification and identification of network applications responsible for network traffic flows offers substantial benefits to a number of key areas in IP network engi...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...