Sciweavers

85 search results - page 11 / 17
» lisa 2008
Sort
View
ISMVL
2008
IEEE
122views Hardware» more  ISMVL 2008»
14 years 1 months ago
RevLib: An Online Resource for Reversible Functions and Reversible Circuits
Synthesis of reversible logic has become an active research area in the last years. But many proposed algorithms are evaluated with a small set of benchmarks only. Furthermore, re...
Robert Wille, Daniel Große, Lisa Teuber, Ger...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 1 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
ACISP
2008
Springer
14 years 1 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...
LISA
2008
13 years 9 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
LISA
2008
13 years 9 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar