Figure 1 - uploaded by Willy Susilo
Content may be subject to copyright.
Firewall Architecture scribe the types of firewalls.

Firewall Architecture scribe the types of firewalls.

Source publication
Article
Full-text available
Personal Digital Assistants (PDAs) have become one of the important tools in our life. Their popularity are due to their small size and mobility which enable them to be carried anywhere. Along with their popularity, handheld devices are starting to become the target for the attackers, who are mainly interested in gaining the data stored in handheld...

Context in source publication

Context 1
... Firewall is a component or set of components that re- stricts access between a protected network and the Internet, or between other sets of networks [24]. A typical scenario of a firewall is illustrated in Figure 1. A bastion host is a computer system between a protected network and the Internet. ...

Similar publications

Article
Full-text available
In this paper, an experimental procedure is proposed for extracting the coefficients of the Igs(Vgs) and Ids(Vgs) Taylor-series expansions along a desired load line. Based on the nonlinear current method, both FET nonlinearities may be accurately characterized from the sub-threshold zone up to deep input junction conduction, allowing an accurate de...
Article
Full-text available
Delay differential equations (DDE) can have "chaotic" solutions that can be used to mimic Brownian motion. Since a Brownian motion is random in its velocity, it is reasonable to think that a random number generator (RNG) might be constructed from such a model. In this preliminary study, we consider one specific example of this and show that it sati...
Article
Full-text available
La necesidad de rehabilitar los músculos de una colostomía me-diante estímulos eléctricos, por medio de un instrumento portátil para volverla continente es de gran necesidad para pacientes colostomi-zados. En 1994, Awad y Luna desarrollaron un simulador recto-anal que muestra las variaciones eléctricas y de presión en el recto y en el esfínter anal...
Article
Full-text available
The aim of this study was to compare the performance between young adults (n = 15), healthy old people (n = 10), and masters athletes (n = 15) using a depth sensor and automated digital assessment framework. Participants were asked to complete a clinically validated assessment of the sit-to-stand technique (five repetitions), which was recorded usi...
Article
Full-text available
A closed loop ZVS-ZCS bidirectional dc-dc converter is modeled and appropriate digital simulations are provided. With the ZVS-ZCS concept, the MATLAB simulation results of application to a fuel cell and battery application have been obtained whenever the input voltage exceeds the given 24V, at that time the load voltage will change from 180V to 230...

Citations

Article
Personal Digital Assistants (PDAs) are one of the most popular computing tools nowadays. Compared with desktop and notebook computers, PDAs are smaller, lighter and can be carried everywhere. However, PDAs have several limitations. They use smaller microprocessors which are much slower than their PC counterparts. Their lack of computational power makes it very difficult to perform some heavy computations, such as generating RSA keys, which needs large prime numbers. Thus, it is useful to have a combination of a PC and a PDA, where the PC performs heavy computations to assist the PDA. This scenario is feasible as long as we assure that the PC will not learn the secret of the PDA. We propose two schemes, which involve some server-aided computations, where the server will not learn the PDAs secret from the interaction. This thesis also investigates the security of PDAs when they are used to perform some cryptographic applications. Due to the limited computational power of PDAs, such computations require some amount of time (and battery life). We show that by observing one of the parameters, we can reduce the hard problem being predictable. We also propose how to securely generate these kinds of computations in PDAs by using some different techniques, so that it will not reveal any additional information to a passive eavesdropper. In addition, along with their popularity, handheld devices are starting to become the target for attackers, who are mainly interested in gaining the data stored in handheld devices. In this thesis, we review the security threats to handheld computers and propose two possible solutions. The first solution is to use a desktop computer to act as a bastion host to protect the handheld computer. The second proposed solution is to build a personal firewall for handheld computers.Keywords: