Sciweavers

8503 search results - page 160 / 1701
» Secure Software Architectures
Sort
View
TDSC
2011
13 years 5 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
SECPERU
2006
IEEE
14 years 4 months ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 10 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
14 years 2 months ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...
COMPSEC
2000
112views more  COMPSEC 2000»
13 years 10 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...