Sciweavers

2337 search results - page 53 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
13 years 11 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
PERCOM
2004
ACM
14 years 7 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 12 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
MICRO
2008
IEEE
159views Hardware» more  MICRO 2008»
14 years 2 months ago
A novel cache architecture with enhanced performance and security
—Caches ideally should have low miss rates and short access times, and should be power efficient at the same time. Such design goals are often contradictory in practice. Recent f...
Zhenghong Wang, Ruby B. Lee
CAISE
2006
Springer
13 years 11 months ago
User Profile Interchange in a Service-oriented Architecture
An adaptive e-learning system needs meaningful information about the learners, the user profile, to achieve a correct content tuning for each of the students. The gathering of this...
Daniela Leal Musa, Renata de Matos Galante, Marius...