Sciweavers

1597 search results - page 116 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CONEXT
2008
ACM
14 years 4 days ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
EUROMICRO
2003
IEEE
14 years 3 months ago
A Web-Based Isosurface Extraction System for Heterogeneous Clients
We present a practical approach to the design of a Web system for 3D and volumetric data interrogation and visualization. This Web application provides different functionalities i...
Andrea Clematis, Daniele D'Agostino, Walter De Mar...
ASPLOS
2006
ACM
14 years 4 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
WISEC
2010
ACM
14 years 5 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
WIOPT
2010
IEEE
13 years 8 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz