Sciweavers

1585 search results - page 37 / 317
» Automatically optimizing secure computation
Sort
View
LCN
2005
IEEE
14 years 1 months ago
Automatic VPN Client Recovery from IPsec Pass-through Failures
Network Address Translation (NAT) is often used in routers that connect home and small-office networks to the Internet. Unfortunately, NAT may not interoperate well with many pro...
José Carlos Brustoloni
CGF
2008
148views more  CGF 2008»
13 years 8 months ago
Automatic Registration for Articulated Shapes
We present an unsupervised algorithm for aligning a pair of shapes in the presence of significant articulated motion and missing data, while assuming no knowledge of a template, u...
Will Chang, Matthias Zwicker
ADC
2007
Springer
107views Database» more  ADC 2007»
14 years 2 months ago
A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents usin...
Tao-Ku Chang, Gwan-Hwan Hwang
JCS
2011
72views more  JCS 2011»
13 years 2 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
TOCS
2002
70views more  TOCS 2002»
13 years 7 months ago
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting confidential data during computation in distributed systems containing mutually untruste...
Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom,...