Sciweavers

15379 search results - page 95 / 3076
» Protecting users from
Sort
View
HPCA
2008
IEEE
14 years 8 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
ICC
2007
IEEE
149views Communications» more  ICC 2007»
14 years 2 months ago
1+N Protection Against Multiple Link Failures in Mesh Networks
Abstract—In [1], the author presented a 1+N protection strategy against single link failures using a network coding approach on p-Cycles. In this paper, we extend this approach t...
Ahmed E. Kamal
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
14 years 1 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...
COMPSAC
2002
IEEE
14 years 22 days ago
Rights Protection for Digital Contents Redistribution Over the Internet
Although Customer-to-Customer (C2C) business model has been around for years, second-hand markets of digital contents over the Internet are unpopular. A key factor to the success ...
Shing-Chi Cheung, Hanif Curreem
DAC
1998
ACM
14 years 8 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...