Sciweavers

1375 search results - page 8 / 275
» eg 2006
Sort
View
ETFA
2006
IEEE
14 years 2 months ago
Profinet IO-Device Emulator based on the Man-in-the-middle Attack
A Profinet IO Network of Class A uses standard Ethernet network components. If these network components can be attacked by e.g. a man-in-themiddle attack, this is also the case fo...
Michel Baud, Max Felser
PARELEC
2006
IEEE
14 years 2 months ago
A Fault-Tolerant Dynamic Fetch Policy for SMT Processors in Multi-Bus Environments
Modern microprocessors get more and more susceptible to transient faults, e.g. caused by high-energetic particles due to high integration, clock frequencies, temperature and decre...
Bernhard Fechner
CAISE
2006
Springer
13 years 11 months ago
Mediation Patterns for Message Exchange Protocols
Abstract. Systems interact with their environment (e.g., other systems) by exchanging messages in a particular order. Interoperability problems arise when systems do not understand...
Stanislav Pokraev, Manfred Reichert
CODES
2006
IEEE
13 years 11 months ago
Application-specific workload shaping in multimedia-enabled personal mobile devices
Today, most personal mobile devices (e.g. cell phones and PDAs) are multimedia-enabled and support a variety of concurrently running applications such as audio/video players, word...
Balaji Raman, Samarjit Chakraborty
FC
2006
Springer
153views Cryptology» more  FC 2006»
13 years 11 months ago
Revisiting Oblivious Signature-Based Envelopes
Secure, anonymous and unobservable communication is becoming increasingly important due to the gradual erosion of privacy in many aspects of everyday life. This prompts the need f...
Samad Nasserian, Gene Tsudik