咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 2 篇 secure computing...
  • 1 篇 sensitive data
  • 1 篇 memory authentic...
  • 1 篇 integrity tree
  • 1 篇 the dual hard di...
  • 1 篇 sensitive file c...
  • 1 篇 secure transmiss...

机构

  • 1 篇 princeton univ d...
  • 1 篇 sci & technol co...
  • 1 篇 kashi univ coll ...

作者

  • 1 篇 lee ruby b.
  • 1 篇 su hong
  • 1 篇 yang yarang
  • 1 篇 zhao yue
  • 1 篇 hao yao
  • 1 篇 lin leyu
  • 1 篇 wu kaijun
  • 1 篇 elbaz reouven
  • 1 篇 niu yiru
  • 1 篇 champagne david

语言

  • 2 篇 英文
检索条件"主题词=secure computing architecture"
2 条 记 录,以下是1-10 订阅
排序:
The secure computing architecture for Dual Hard Disk and Dual System Switching  5
The Secure Computing Architecture for Dual Hard Disk and Dua...
收藏 引用
5th IEEE International Conference on Big Data and Artificial Intelligence (BDAI)
作者: Zhao, Yue Lin, Leyu Niu, Yiru Wu, Kaijun Hao, Yao Su, Hong Yang, Yarang Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China Kashi Univ Coll Phys & Elect Engn Kashi 84006 Peoples R China
This paper proposes a secure computing architecture based on the dual hard disk and dual system switching ((DS)-S-3), and provide the mechanism of sensitive data copy and transmission processing for the two operating ... 详细信息
来源: 评论
The Reduced Address Space (RAS) for application memory authentication
The Reduced Address Space (RAS) for application memory authe...
收藏 引用
11th Information Security Conference
作者: Champagne, David Elbaz, Reouven Lee, Ruby B. Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Memory authentication is the ability to detect unauthorized modification of memory. Existing solutions for memory authentication are based on tree structures computed over either the Physical Address Space (PAS tree) ... 详细信息
来源: 评论