Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Lyndon G. Pierson"'
Publikováno v:
HOST
The microelectronics industry seeks screening tools that can be used to verify the origin of and track integrated circuits (ICs) throughout their lifecycle. Embedded circuits that measure process variation of an IC are well known. This paper adds to
Autor:
Lyndon G. Pierson, Perry J. Robertson
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7cd16e59018002676d085a2da97e0f34
https://doi.org/10.2172/1226788
https://doi.org/10.2172/1226788
Autor:
Sergiu Sanielevici, Arthurine Breckenridge, Juergen Schulze, Uwe Woessner, Lyndon G. Pierson, Joel Welling, Rainer Keller
Publikováno v:
Future Generation Computer Systems. 19:849-859
Distributed, on-demand, data-intensive, and collaborative simulation analysis tools are being developed by an international team to solve real problems such as bioinformatics applications. The project consists of three distinct focuses: compute, visu
Autor:
Chris Jenkins, Lyndon G. Pierson
Publikováno v:
TrustCom
As the field of determined and increasingly sophisticated adversaries multiplies, the risk to integrity of deployed computing devices magnifies. Given the ubiquitous connectivity, substantial storage, and accessibility, the increased reliance on comp
Publikováno v:
ACM SIGCOMM Computer Communication Review. 29:35-49
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. Encryption hardware, designed for use in high-speed communications networ
Autor:
Perry J. Robertson, Jamie A. Van Randwyk, Toole, Timothy J. (Sandia National Laboratories, Livermore, Ca), N. Durgin, Brent D. Kucera, Philip Campbell, Lyndon G. Pierson
An increasing number of corporate security policies make it desirable to push security closer to the desktop. It is not practical or feasible to place security and monitoring software on all computing devices (e.g. printers, personal digital assistan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26be96c82a57fd40628a804dcd9aa05e
https://doi.org/10.2172/984103
https://doi.org/10.2172/984103
Autor:
J. Van Randwyk, Perry J. Robertson, Lyndon G. Pierson, Toole, Timothy J. (Sandia National Laboratories, Livermore, Ca)
Publikováno v:
Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.
Current methods of enforcing security policy depend on security patches, anti-virus protections, and configuration control, all updated in the end user's computer at ever decreasing intervals. This research is producing a method of hardening the corp
Autor:
William Erik Anderson, Cheryl L. Beaver, Lyndon G. Pierson, William Douglas Neumann, Richard Crabtree Schroeppel, Hamilton E. Link, Philip Campbell
If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ea6dab042a9a6c89bb44d47c3eff689
https://doi.org/10.2172/919632
https://doi.org/10.2172/919632
Autor:
Lyndon G. Pierson, Gregory Allen Vawter, Richard Crabtree Schroeppel, Thomas D. Tarman, Perry J. Robertson, Jason D. Tang, Ethan L. Blansett
With the build-out of large transport networks utilizing optical technologies, more and more capacity is being made available. Innovations in Dense Wave Division Multiplexing (DWDM) and the elimination of optical-electrical-optical conversions have b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02cfee202119c2ddafa2984d8e890646
https://doi.org/10.2172/918388
https://doi.org/10.2172/918388
Autor:
Anand Ganti, Christopher P. Tigges, Normand Arthur Modine, Lyndon G. Pierson, Richard Crabtree Schroeppel
In a superposition of quantum states, a bit can be in both the states '0' and '1' at the same time. This feature of the quantum bit or qubit has no parallel in classical systems. Currently, quantum computers consisting of 4 to 7 qubits in a 'quantum
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::48ae2456a5d87e590828243da2a19a59
https://doi.org/10.2172/918282
https://doi.org/10.2172/918282