Sciweavers

166 search results - page 28 / 34
» Protecting Applications with Transient Authentication
Sort
View
IEICET
2008
124views more  IEICET 2008»
13 years 6 months ago
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Vir...
Yohei Hori, Hiroyuki Yokoyama, Hirofumi Sakane, Ke...
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 6 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
TDSC
2008
125views more  TDSC 2008»
13 years 6 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
IMSCCS
2006
IEEE
14 years 22 days ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
VISUALIZATION
2005
IEEE
14 years 8 days ago
Volume rendering of smoke propagation CFD data
The evacuation of buildings in the event of a fire requires careful planning of ventilation and evacuation routes during early architectural design stages. Different designs are ...
Oliver Staubli, Christian Sigg, Ronald Peikert, Ma...