Sciweavers

1801 search results - page 276 / 361
» Memory-Centric Security Architecture
Sort
View
SAC
2000
ACM
15 years 8 months ago
XML Dataspaces for Mobile Agent Coordination
This paper presents XMARS, a programmable coordination architecture for Internet applications based on mobile agents. In XMARS, agents coordinate – both with each other and with...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
SOSP
2003
ACM
16 years 1 months ago
Separating agreement from execution for byzantine fault tolerant services
We describe a new architecture for Byzantine fault tolerant state machine replication that separates agreement that orders requests from execution that processes requests. This se...
Jian Yin, Jean-Philippe Martin, Arun Venkataramani...
DAC
2002
ACM
16 years 5 months ago
Unlocking the design secrets of a 2.29 Gb/s Rijndael processor
This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput ...
Patrick Schaumont, Henry Kuo, Ingrid Verbauwhede
PERCOM
2005
ACM
16 years 4 months ago
Gaia Microserver: An Extendable Mobile Middleware Platform
The Gaia ubiquitous computing platform currently supports mobile devices through a thin client proxy architecture. Mobile devices run a lightweight proxy client written in J2ME to...
Ellick Chan, Jim Bresler, Jalal Al-Muhtadi, Roy H....
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 11 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll