Sciweavers

216 search results - page 15 / 44
» Security Measures and Weaknesses of the GPRS Security Archit...
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis
ASPLOS
2008
ACM
13 years 10 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
TRUST
2009
Springer
14 years 3 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
DAC
2008
ACM
13 years 10 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
IICS
2003
Springer
14 years 1 months ago
Message-Oriented-Middleware in a Distributed Environment
Middleware technologies have been facilitating the communication between the distributed applications. Traditional messaging system’s are synchronous and have inherent weaknesses...
Sushant Goel, Hema Sharda, David Taniar