Sciweavers

331 search results - page 40 / 67
» Structuring Protocol Implementations to Protect Sensitive Da...
Sort
View
CODES
2008
IEEE
15 years 9 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
152
Voted
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 9 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
121
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 3 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
STORAGESS
2006
ACM
15 years 8 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
129
Voted
WMCSA
1999
IEEE
15 years 6 months ago
TCP Performance in Wireless Multi-hop Networks
In this study we investigate the interaction between TCP and MAC layer in a wireless multi-hop network. Using simulation, we provide new insight into two critical problems of TCP ...
Mario Gerla, Ken Tang, Rajive Bagrodia