Sciweavers

199 search results - page 3 / 40
» A system for a new two-dimensional code: Secure 2D code
Sort
View
ICASSP
2007
IEEE
14 years 1 months ago
ICA-Based Algorithms Applied to Image Coding
Recently, Narozny et al [1] proposed a new viewpoint in variable high-rate transform coding. They showed that the problem of finding the optimal 1-D linear block transform for a ...
Michel Narozny, Michel Barret
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 1 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 7 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
WISEC
2010
ACM
13 years 5 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
TRUST
2010
Springer
13 years 5 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte