Sciweavers

986 search results - page 52 / 198
» Protecting the Intranet Against
Sort
View
INFOCOM
2003
IEEE
14 years 2 months ago
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter
Abstract— This paper studies the problem of designing survivable optical wavelength division multiplexed (WDM) networks. A wavelength-routed wide area backbone network supporting...
Sunil Gowda, Krishna M. Sivalingam
TMC
2008
159views more  TMC 2008»
13 years 7 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ACSAC
2009
IEEE
14 years 4 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
ICICS
2009
Springer
14 years 3 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...
ISCAS
2002
IEEE
118views Hardware» more  ISCAS 2002»
14 years 2 months ago
Adaptive playout for real-time media streaming
When media is streamed over best-effort networks, a buffer at the client protects against playout interruptions due to variations in the data arrival rate. While the amount of pro...
Mark Kalman, Eckehard G. Steinbach, Bernd Girod