Sciweavers

5488 search results - page 977 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
EUSAI
2004
Springer
15 years 8 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
FPL
2006
Springer
120views Hardware» more  FPL 2006»
15 years 8 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
GCC
2006
Springer
15 years 8 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
GCC
2006
Springer
15 years 8 months ago
On Interoperability: The Execution Management Perspective Based on ChinaGrid Support Platform*
Interoperability between different Grid implementations is attracting more and more attention to seamlessly job execution. In this paper, one approach is proposed to implement the...
Yongwei Wu, Likun Liu, Weimin Zheng, Feng He
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 6 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp