Sciweavers

5488 search results - page 1032 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
CCGRID
2004
IEEE
15 years 8 months ago
A Java-based programming environment for hierarchical Grid: Jojo
Despite recent developments in higher-level middleware for the Grid supporting high level of ease-of-programming, hurdles for widespread adoption of Grids remain high, due to (1) ...
Hidemoto Nakada, Satoshi Matsuoka
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
15 years 8 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj
FTDCS
2004
IEEE
15 years 8 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
DSN
2006
IEEE
15 years 8 months ago
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance
This paper presents our experience validating the flood tolerance of two network interface card (NIC)-based embedded firewall solutions, the Embedded Firewall (EFW) and the Autono...
Michael Ihde, William H. Sanders
« Prev « First page 1032 / 1098 Last » Next »