Sciweavers

2207 search results - page 57 / 442
» Security at the Internet Layer
Sort
View
APWEB
2006
Springer
15 years 7 months ago
An Energy Efficient Cross-Layer MAC Protocol for Wireless Sensor Networks
In the area of wireless sensor networks, achieving minimum energy consumption is a very important research issue. A number of energy efficient protocols have been proposed, mostly ...
Changsu Suh, Young-Bae Ko, Dong-Min Son
MICRO
2002
IEEE
131views Hardware» more  MICRO 2002»
15 years 3 months ago
Protocol Wrappers for Layered Network Packet Processing in Reconfigurable Hardware
abstracting the operation of lower-level packet processing functions. The library synthesizes into field-programmable gate array (FPGA) logic and is utilized in a network platform ...
Florian Braun, John W. Lockwood, Marcel Waldvogel
LISA
2007
15 years 6 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
EATIS
2007
ACM
15 years 8 months ago
Application layer multicast techniques in grid environments
Resource and service discovery, data transfer or replica management, are some examples of basic operations of a grid which can gain efficiency by using multicast transmission tech...
Rafael Moreno-Vozmediano
CACM
2002
77views more  CACM 2002»
15 years 3 months ago
Security considerations for remote electronic voting
This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections ...
Aviel D. Rubin