Sciweavers

2270 search results - page 204 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
155
Voted
HPCA
2005
IEEE
16 years 4 months ago
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors
With the increasing concern of the security on high performance multiprocessor enterprise servers, more and more effort is being invested into defending against various kinds of a...
Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhan...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 4 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
110
Voted
IFIP
2007
Springer
15 years 10 months ago
A Door Access Control System with Mobile Phones
Abstract. This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is ...
Tomomi Yamasaki, Toru Nakamura, Kensuke Baba, Hiro...
VIS
2005
IEEE
150views Visualization» more  VIS 2005»
16 years 5 months ago
VolumeExplorer: Roaming Large Volumes to Couple Visualization and Data Processing for Oil and Gas Exploration
In this paper, we present a volume roaming system dedicated to oil and gas exploration. Our system combines probebased volume rendering with data processing and computing. The dai...
Laurent Castanie, Bruno Lévy, Fabien Bosque...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
15 years 3 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang