Sciweavers

8644 search results - page 1615 / 1729
» On the Composition of Secure Systems
Sort
View
DSN
2007
IEEE
14 years 4 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
GLOBECOM
2007
IEEE
14 years 4 months ago
AMBER Sched: An Analytical Model Based Resource Scheduler for Programmable Routers
—The growth of the Internet in the last years has been pushed by increasing requirements in terms of capacity, security and reliability. Moreover, improvements in multimedia appl...
Domenico Ficara, Stefano Giordano, Michele Pagano,...
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
14 years 4 months ago
An Experiment on the Effects of Interruptions on Individual Work Trajectories and Performance in Critical Environments
Interruptions are a central characteristic of work in critical environments such as hospitals, airlines, and security agencies. Often, interruptions occur as notifications of some...
Suzanne P. Weisband, Kelly J. Fadel, Elisa Mattare...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 4 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ICC
2007
IEEE
14 years 4 months ago
Towards Sender-Based TFRC
—Pervasive communications are increasingly sent over mobile devices and personal digital assistants. This trend has been observed during the last football world cup where cellula...
Guillaume Jourjon, Emmanuel Lochin, Patrick S&eacu...
« Prev « First page 1615 / 1729 Last » Next »