HoChiMinh City University of Technology

Displaying 1-3 of 3 results

  • White Papers // Feb 2011

    ECEB: Enhanced Constraint Repetition Block for Regular Expression Matching on FPGA

    Recent Network Intrusion Detection Systems (NIDSs) utilize Perl Compatible Regular Expression to describe malicious patterns existing in the content payload of packets more and more efficiently. Several techniques are introduced to optimize the performance or complete the system for full support all of PCRE features in hardware platform, but some...

    Provided By HoChiMinh City University of Technology

  • White Papers // Dec 2009

    Security Visualization for Peer-to-Peer Resource Sharing Applications

    Security of an information system is only as strong as its weakest element. Popular elements of such system include hardware, software, network and people. Current approaches to computer security problems usually exclude people in their studies even though it is an integral part of these systems. To fill that gap,...

    Provided By HoChiMinh City University of Technology

  • White Papers // Nov 2009

    An Extended Payment Model for M-Commerce With Fair Non-Repudiation Protocols

    Non-repudiation in e-commerce has recently gained a lot of interest but its successor brother, non-repudiation in m-commerce, is still at the start. This paper proposes an extension of existing mobile payment models to introduce an Extended Mobile Payment Service (EMPS) model, which is based on assumptions about the cooperation between...

    Provided By HoChiMinh City University of Technology

  • White Papers // Nov 2009

    An Extended Payment Model for M-Commerce With Fair Non-Repudiation Protocols

    Non-repudiation in e-commerce has recently gained a lot of interest but its successor brother, non-repudiation in m-commerce, is still at the start. This paper proposes an extension of existing mobile payment models to introduce an Extended Mobile Payment Service (EMPS) model, which is based on assumptions about the cooperation between...

    Provided By HoChiMinh City University of Technology

  • White Papers // Dec 2009

    Security Visualization for Peer-to-Peer Resource Sharing Applications

    Security of an information system is only as strong as its weakest element. Popular elements of such system include hardware, software, network and people. Current approaches to computer security problems usually exclude people in their studies even though it is an integral part of these systems. To fill that gap,...

    Provided By HoChiMinh City University of Technology

  • White Papers // Feb 2011

    ECEB: Enhanced Constraint Repetition Block for Regular Expression Matching on FPGA

    Recent Network Intrusion Detection Systems (NIDSs) utilize Perl Compatible Regular Expression to describe malicious patterns existing in the content payload of packets more and more efficiently. Several techniques are introduced to optimize the performance or complete the system for full support all of PCRE features in hardware platform, but some...

    Provided By HoChiMinh City University of Technology