Sciweavers

2699 search results - page 488 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
14 years 2 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux
DSN
2009
IEEE
14 years 2 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
GLOBECOM
2007
IEEE
14 years 2 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Temporary Interconnection of ZigBee Personal Area Network (PAN)
—ZigBee is popular for Wireless Sensor Network (WSN) devices because of its low power consumption, built-in security method and ratified specifications. With these features, it...
Sewook Jung, Alexander Chang, Mario Gerla
ACCV
2007
Springer
14 years 1 months ago
Comparative Studies on Multispectral Palm Image Fusion for Biometrics
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi...
Ying Hao, Zhenan Sun, Tieniu Tan