Sciweavers

3452 search results - page 122 / 691
» Secure Data Outsourcing
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 3 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
WETICE
2002
IEEE
14 years 3 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
ASPLOS
2008
ACM
14 years 2 days ago
Parallelizing security checks on commodity hardware
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows se...
Edmund B. Nightingale, Daniel Peek, Peter M. Chen,...
ICASSP
2011
IEEE
13 years 1 months ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu
GI
2009
Springer
13 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...