Sciweavers

5123 search results - page 6 / 1025
» Performance and Security Tradeoff
Sort
View
DAGSTUHL
2007
13 years 10 months ago
Civitas: A Secure Remote Voting System
Civitas is the first implementation of a coercion-resistant, universally verifiable, remote voting scheme. This paper describes the design of Civitas, details the cryptographic ...
Michael E. Clarkson, Stephen Chong, Andrew C. Myer...
DSN
2005
IEEE
14 years 2 months ago
Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files
Register files are in the critical path of most high-performance processors and their latency is one of the most important factors that limit their size. Our goal is to develop er...
Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, ...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 1 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ENTCS
2008
390views more  ENTCS 2008»
13 years 7 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
WICON
2008
13 years 10 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...