Parthenon: a parallel theorem prover for non-Horn clauses
Journal of Automated Reasoning
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Mechanical Theorem-Proving by Model Elimination
Journal of the ACM (JACM)
A new model of security for metasystems
Future Generation Computer Systems - Special issue on metacomputing
A large scale distributed intrusion detection framework based on attack strategy analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
Architectural support for fast symmetric-key cryptography
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
CryptoManiac: a fast flexible architecture for secure communication
ISCA '01 Proceedings of the 28th annual international symposium on Computer architecture
Distributed LTL model-checking in SPIN
SPIN '01 Proceedings of the 8th international SPIN workshop on Model checking of software
Parallel state space construction for model-checking
SPIN '01 Proceedings of the 8th international SPIN workshop on Model checking of software
Quantifying the costs and benefits of architectural decisions
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
MOPS: an infrastructure for examining security properties of software
Proceedings of the 9th ACM conference on Computer and communications security
Reconfigurable Implementation of Elliptic Curve Crypto Algorithms
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
Integrity and Performance in Network Attached Storage
ISHPC '99 Proceedings of the Second International Symposium on High Performance Computing
Parallel Model Checking for the Alternation Free µ-Calculus
TACAS 2001 Proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
A Language-Based Approach to Security
Informatics - 10 Years Back. 10 Years Ahead.
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Distributed Symbolic Model Checking for µ-Calculus
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
PARTHEO: A High-Performance Parallel Theorem Prover
Proceedings of the 10th International Conference on Automated Deduction
Caching and Lemmaizing in Model Elimination Theorem Provers
CADE-11 Proceedings of the 11th International Conference on Automated Deduction: Automated Deduction
A Fast New DES Implementation in Software
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Software Architecture in Practice
Software Architecture in Practice
Proving Security Protocols Correct
LICS '99 Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science
The Globus Project: A Status Report
HCW '98 Proceedings of the Seventh Heterogeneous Computing Workshop
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
A secure communications infrastructure for high-performance distributed computing
HPDC '97 Proceedings of the 6th IEEE International Symposium on High Performance Distributed Computing
Breaking the barriers: high performance security for high performance computing
Proceedings of the 2002 workshop on New security paradigms
Scalable Pattern Matching for High Speed Networks
FCCM '04 Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
Pre-Decoded CAMs for Efficient and High-Speed NIDS Pattern Matching
FCCM '04 Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
SBAC-PAD '04 Proceedings of the 16th Symposium on Computer Architecture and High Performance Computing
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
Application of SVM and ANN for intrusion detection
Computers and Operations Research
A Grid-based Intrusion Detection System
ICNICONSMCL '06 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
Accelerating private-key cryptography via multithreading on symmetric multiprocessors
ISPASS '03 Proceedings of the 2003 IEEE International Symposium on Performance Analysis of Systems and Software
An Anomaly Intrusion Detection System Based on Vector Quantization
IEICE - Transactions on Information and Systems
CuPIDS: An exploration of highly focused, co-processor-based information system protection
Computer Networks: The International Journal of Computer and Telecommunications Networking
A framework model for grid security
Future Generation Computer Systems
StReD: A quality of security framework for storage resources in Data Grids
Future Generation Computer Systems
Proving the Correctness of Multiprocess Programs
IEEE Transactions on Software Engineering
Access control management for ubiquitous computing
Future Generation Computer Systems
Modern Operating Systems
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
High-Speed Matching of Vulnerability Signatures
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Performance analysis of security aspects by weaving scenarios extracted from UML models
Journal of Systems and Software
Modeling and analysis of security trade-offs - A goal oriented approach
Data & Knowledge Engineering
Security enforcement aware software development
Information and Software Technology
The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Communications of the ACM
CUDA Accelerated LTL Model Checking
ICPADS '09 Proceedings of the 2009 15th International Conference on Parallel and Distributed Systems
Scalable multi-core LTL model-checking
Proceedings of the 14th international SPIN conference on Model checking software
Fast Virus Signature Matching Based on the High Performance Computing of GPU
ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Some computer organizations and their effectiveness
IEEE Transactions on Computers
Security services architecture for Secure Mobile Grid Systems
Journal of Systems Architecture: the EUROMICRO Journal
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
External memory breadth-first search with delayed duplicate detection on the GPU
MoChArt'10 Proceedings of the 6th international conference on Model checking and artificial intelligence
Security and performance trade-off in PerfCloud
Euro-Par 2010 Proceedings of the 2010 conference on Parallel processing
An automatic intrusion diagnosis approach for clouds
International Journal of Automation and Computing
GridCrypt: high performance symmetric key cryptography using enterprise grids
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Towards a grid-wide intrusion detection system
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Survey: Usage control in computer security: A survey
Computer Science Review
Design and evaluation of a high-performance ATM firewall switch and its applications
IEEE Journal on Selected Areas in Communications
Formal methods for cryptographic protocol analysis: emerging issues and trends
IEEE Journal on Selected Areas in Communications
The CloudGrid approach: Security analysis and performance evaluation
Future Generation Computer Systems
Fast computation of the performance evaluation of biometric systems: Application to multibiometrics
Future Generation Computer Systems
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
Timed protocol insecurity problem is NP-complete
Future Generation Computer Systems
Future Generation Computer Systems
Reasoning about minimal anonymity in security protocols
Future Generation Computer Systems
Future Generation Computer Systems
Improving Mandatory Access Control for HPC clusters
Future Generation Computer Systems
Future Generation Computer Systems
Bus and memory protection through chain-generated and tree-verified IV for multiprocessors systems
Future Generation Computer Systems
Hi-index | 0.00 |