Sciweavers

331 search results - page 30 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
137
Voted
SIGMETRICS
2011
ACM
178views Hardware» more  SIGMETRICS 2011»
14 years 5 months ago
Soft error benchmarking of L2 caches with PARMA
The amount of charge stored in an SRAM cell shrinks rapidly with each technology generation thus increasingly exposing caches to soft errors. Benchmarking the FIT rate of caches d...
Jinho Suh, Mehrtash Manoochehri, Murali Annavaram,...
117
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
119
Voted
AINA
2008
IEEE
15 years 4 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
143
Voted
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 2 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
IJSNET
2010
317views more  IJSNET 2010»
14 years 9 months ago
MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks
: Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in terms of...
Xuedong Liang, Min Chen, Yang Xiao, Ilangko Balasi...