A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
2008
High-Performance Computer Architecture
In this work we propose a new and efficient memory encryption and authentication solution for protecting the confidentiality and integrity of data in a DSM system. ...
Then this processor will encrypt, sign, and communicate the data to the requesting processor which will decrypt and authenticate the data again, all using processor-to-processor protection mechanisms. ...
Introduction Computer users are becoming increasingly aware of and concerned for the security of their computer systems. ...
doi:10.1109/hpca.2008.4658636
dblp:conf/hpca/RogersYCPS08
fatcat:hiv72zl6xfgr5hm7qdkixrpriq
Transport layer security: how much does it really cost?
1999
IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)
The Secure Sockets Layer (SSL) protocol provides this capability and it is the most widely used transport layer security protocol. ...
Since SSL is primarily used to secure web transactions, we use the SPECWeb96 benchmark suitably modified for use with the SSL protocol. ...
This can take quite a while and so, for light loads, there is hardly any apparent reduction in latency even when there is session reuse. ...
doi:10.1109/infcom.1999.751458
dblp:conf/infocom/ApostolopoulosPS99
fatcat:rvzhojgvb5bk5gq36xowhhut74
Mobile Cloud Computing: Taxonomy and Challenges
2020
Journal of Computer Networks and Communications
Therefore, taxonomy for MCC is presented considering major themes of research including energy-aware, security, applications, and QoS-aware developments. ...
The issues include energy efficiency in MCC, secured MCC, user-satisfied applications and Quality of Service-aware MCC (QoS). ...
Acknowledgments e research, whose summary has been provided in the abstract, was supported by the Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC ...
doi:10.1155/2020/2547921
fatcat:b3gjy7v6cvbfxlvdmghaqksciq
On Encrypting and Signing Binary XML Messages in the Wireless Environment
2006
2006 IEEE International Conference on Web Services (ICWS'06)
However, an alternate serialization format is not easily made compatible with XML security features such as encryption and signing. ...
In the wireless world there has recently been much interest in alternate serialization formats for XML data, mostly driven by the weak capabilities of both devices and networks. ...
XML Encryption also permits transformations to be applied, but these are performed only on referenced URIs to produce the actual encrypted bytes for the decrypter, and not on decrypted data. ...
doi:10.1109/icws.2006.95
dblp:conf/icws/KangasharjuLT06
fatcat:et6vpdyn4rcitbr6hzkwqv624q
Adaptive Security for Intelligent Transport System Applications
2018
IEEE Intelligent Transportation Systems Magazine
We further present future opportunities to optimize the security-QoS balance for ITS applications. ...
Using an experimental test-bed, we evaluate the standard compliant security processing delays, develop an online tool that presents detailed security benchmark results, and study the impact of security ...
procedure, three parameters are important including security overhead, ENCAP delay (for signature/encryption operations) at the transmitter, and DECAP delay (for security verification/decryption) at the ...
doi:10.1109/mits.2018.2806636
fatcat:uuagwiyyafdnjn4ptzwc6a7vue
MACsec Layer 2 Security in HSR Rings in Substation Automation Systems
2017
Energies
At the lower level, added security must not interfere with the redundancy and the latency required for the real-time substation automation communications. ...
This point-to-point securization happens at level 2, and this means that higher level protocols or applications are completely unaffected by the security protocol. ...
As in the previous case, this means that non security aware equipment may be used and that the standard HSR latency is applied. At the same time, all communication can be secured if desired. ...
doi:10.3390/en10020162
fatcat:53lfon25ofgbbnzsa5tquvn4bq
Architecture For Data Management
2015
Zenodo
We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data ...
Specifically the document lays out the architecture for data privacy, secure sharing schemes, geo-replication and fault and disaster tolerance for SUPERCLOUD data management. ...
Recently, and within the context of SUPERCLOUD, we conducted an extensive experimental study to assess which of the well-know optimizations proposed for improving the latency of SMR protocols on wide-area ...
doi:10.5281/zenodo.49788
fatcat:5oup2d7sk5dm7efj77pjvg2bru
A measurement study of offloading virtual network functions to the edge
2021
Journal of Supercomputing
We experimentally demonstrate reduced VNF execution latency and energy consumption for a real-time video streaming application in comparison with a software-only baseline. ...
This approach has been validated by practical use cases with both TCP and UDP as underlying protocol on a physical testbed environment. ...
The edge server application serves as client and server for parsing the data, encrypting/decrypting and timestamping for latency measurements. ...
doi:10.1007/s11227-021-03907-0
fatcat:zsfyj6vxj5fo5p6rwps6fttb34
Improving Memory Encryption Performance in Secure Processors
2005
IEEE transactions on computers
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. ...
In this design, the program and data are stored in an encrypted format outside the CPU boundary. The decryption is carried out after they are fetched from memory and before they are used by the CPU. ...
Other Security and Implementation Issues Context switching. One of the difficulties we realized is to handle a situation in context switching. ...
doi:10.1109/tc.2005.80
fatcat:n5npyyer3zdm3omvztwnk2gszy
The case for crypto protocol awareness inside the OS kernel
2005
SIGARCH Computer Architecture News
We describe our prototype implementation for the OpenBSD operating system and quantify its performance implications. ...
In this way, we can reduce the number of system calls and context switches to a small constant number, and the amount of data copying that involves the web server by 100%. ...
Conclusions Cryptographic protocols are a fundamental building block for securing the Internet. ...
doi:10.1145/1055626.1055635
fatcat:fogjhb2y7vhp3aqnwfqrc3i3oq
A security infrastructure for massive mobile data distribution
2013
Proceedings of the 11th ACM international symposium on Mobility management and wireless access - MobiWac '13
This work presents a data distribution layer based on the OMG DDS standard, developed to enforce CIA for data distribution through the usage of PKI and symmetric cryptography. ...
Examples of those applications include fleet management, workforce coordination, Intelligent Transportation Systems, cooperative mobile robots, rescue and emergency management, and environmental surveillance ...
In this context, each topic identified by a tag has a corresponding symmetric key, used to encrypt and decrypt the data published on it. ...
doi:10.1145/2508222.2508237
dblp:conf/mobiwac/GoncalvesSVBE13
fatcat:z2qnzhh44jc6fcllnlakcocdpe
Smart Grid ICT Research Lines out of the European Project INTEGRIS
2014
Network Protocols and Algorithms
protocols, networking at different layers, cognitive systems and storage and replication of data. ...
The present paper presents these requirements, the solutions and results developed and tested in the FP7 European Project INTEGRIS, especially in the security domain, as well as the future challenges and ...
In addition, we would like to thank La Salle (Universitat Ramon Llull) for their support. ...
doi:10.5296/npa.v6i2.5439
fatcat:i2xvbcdiyjepxn5g6sn3ayoqzq
Towards Edge-assisted Internet of Things: From Security and Efficiency Perspectives
[article]
2019
arXiv
pre-print
We then study the security, privacy and efficiency challenges in data processing for mobile edge computing, and discuss the opportunities to enhance data security and improve computational efficiency with ...
Although the advance of mobile edge computing on service latency is studied solidly, security and efficiency on data usage in mobile edge computing have not been clearly identified. ...
While data encryption standards and security protocols, e.g., AES CBC, RFC 5246 and IEEE SA-1735, can achieve end-to-end data confidentiality, they also constrict the pre- processing on the encrypted data ...
arXiv:1902.07094v1
fatcat:j5tq4s4dhzddjol5acheyudfrq
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks
2016
2016 IEEE International Conference on Communications (ICC)
) protocol for V2G networks. ...
In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6 ...
To rectify the above problems, in this paper, a secure and privacy-aware PMIPv6 (SP-PMIPv6) protocol for V2G networks is proposed. ...
doi:10.1109/icc.2016.7510934
dblp:conf/icc/EizaSMO16
fatcat:e32it6t7dbee5gs6a4574gaq4i
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
2016
Sensors
delays, packet and cryptographic losses, and reduced safety awareness in safety applications. ...
Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. ...
Elliptic Curve Integrated Encryption Scheme (ECIES) with Advanced Encryption Standard (AES) The second security algorithm is ECIES with AES for encrypting and decrypting exchanged messages, and whose objective ...
doi:10.3390/s16060879
pmid:27314358
pmcid:PMC4934305
fatcat:7nshke6ntbe57cysndaxy22snu
« Previous
Showing results 1 — 15 out of 1,293 results