Sciweavers

181 search results - page 33 / 37
» A Mechanism for Verifying Data Speculation
Sort
View
SENSYS
2003
ACM
14 years 19 days ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
TRUST
2010
Springer
14 years 13 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
MICCAI
2009
Springer
14 years 8 months ago
Biomechanically-Constrained 4D Estimation of Myocardial Motion
We propose a method for the analysis of Magnetic Resonance (MR) cardiac images with the goal of reconstructing the motion of the ventricular walls. The main feature of our method i...
Hari Sundar, Christos Davatzikos, George Biros
TRUST
2010
Springer
14 years 13 days ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifia...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel ...
ASPLOS
2006
ACM
13 years 11 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...