Sciweavers

1801 search results - page 298 / 361
» Memory-Centric Security Architecture
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
A Framework for Proactive Fault Tolerance
Fault tolerance is a major concern to guarantee availability of critical services as well as application execution. Traditional approaches for fault tolerance include checkpoint/r...
Geoffroy Vallée, Kulathep Charoenpornwattan...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
IPPS
2007
IEEE
14 years 4 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
14 years 4 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
IEEEARES
2006
IEEE
14 years 4 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett