Sciweavers

4413 search results - page 731 / 883
» Security for biometric data
Sort
View
BROADCOM
2008
IEEE
15 years 10 months ago
A Roadmap to Proliferate Open Source Software Usage within SA Government Servers
Open Source software (OSS) is increasingly being recognized by the government sector around the world as a viable choice to proprietary software, particularly in a number of areas...
Jabu Mtsweni, Elmarie Biermann
ICCCN
2008
IEEE
15 years 10 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
123
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
120
Voted
ISCAS
2008
IEEE
185views Hardware» more  ISCAS 2008»
15 years 10 months ago
A full-custom design of AES SubByte module with signal independent power consumption
—A full-custom design of AES SubByte module based on Sense Amplifier Based Logic is proposed in this paper. Power consumption of this design is independent of both value and sequ...
Liang Li, Jun Han, Xiaoyang Zeng, Jia Zhao
112
Voted
ISCAS
2008
IEEE
102views Hardware» more  ISCAS 2008»
15 years 10 months ago
Asynchronous balanced gates tolerant to interconnect variability
Abstract— Existing methods of gate level power attack countermeasures depend on exact capacitance matching of the dual-rail data outputs of each gate. Process variability and a l...
Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang...