Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Memory Confidentiality and Integrity Protection Technology
In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...
-
Chapter
Tree-Mesh Based P2P Streaming Data Distribution Scheme
This paper presents the design of a novel P2P live streaming policy, tree-mesh based P2P Streaming Data Distribution Scheme(TMDS). Both the tree-based and the mesh-based structures have respective flaws while ...