Sciweavers

5511 search results - page 1070 / 1103
» Security for Network Places
Sort
View
EXPCS
2007
14 years 27 days ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags
ICCD
2007
IEEE
152views Hardware» more  ICCD 2007»
14 years 26 days ago
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors
As application-specific instruction set processors (ASIPs) are being increasingly used in mobile embedded systems, the ubiquitous networking connections have exposed these systems...
Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 23 days ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 21 days ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
FPL
2006
Springer
120views Hardware» more  FPL 2006»
14 years 20 days ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...
« Prev « First page 1070 / 1103 Last » Next »