Sciweavers

2178 search results - page 312 / 436
» Toward Systemically Secure IT Architectures
Sort
View
SIGMOD
2006
ACM
156views Database» more  SIGMOD 2006»
14 years 8 months ago
Data delivery in a service-oriented world: the BEA aquaLogic data services platform
"Wow. I fell asleep listening to SOA music, and when I woke up, I couldn't remember where I'd put my data. Now what?" Has this happened to you? With the new pu...
Michael J. Carey
JCP
2008
160views more  JCP 2008»
13 years 8 months ago
A Bluetooth-based Sensor Node for Low-Power Ad Hoc Networks
TCP/IP has recently taken promising steps toward being a viable communication architecture for networked sensor nodes. Furthermore, the use of Bluetooth can enable a wide range of ...
Jens Eliasson, Per Lindgren, Jerker Delsing
CSREAPSC
2006
13 years 9 months ago
The Anatomy of a Universal Domotics Integrator for Globally Interconnected Devices
Home Automation Technologies make possible the deployment of home monitoring and control applications. These technologies rely on different networking technologies. Some of them ar...
Driart Elshani, Pascal Francq
IPCCC
2006
IEEE
14 years 2 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ARC
2010
Springer
178views Hardware» more  ARC 2010»
14 years 2 months ago
An Analysis of Delay Based PUF Implementations on FPGA
Physical Unclonable Functions promise cheap, efficient, and secure identification and authentication of devices. In FPGA devices, PUFs may be instantiated directly from FPGA fabri...
Sergey Morozov, Abhranil Maiti, Patrick Schaumont