Sciweavers

2178 search results - page 290 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
13 years 11 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
NOMS
2006
IEEE
14 years 2 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
WEBNET
2000
13 years 9 months ago
Making General-Purpose Adaptive Hypermedia Work
: Adaptive hypermedia systems (AHS) have typically been geared towards one specific application or application area, in most cases related to education. The AHA (Adaptive Hypermedi...
Paul De Bra, A. T. M. Aerts, Geert-Jan Houben, Hon...
ICDCS
2008
IEEE
14 years 2 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
CCS
2008
ACM
13 years 10 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta