Sciweavers

121 search results - page 11 / 25
» Breaking Fully-Homomorphic-Encryption Challenges
Sort
View
ICSE
2008
IEEE-ACM
14 years 10 months ago
Promoting developer-specific awareness
Maintaining a developer's awareness of changes in the software on which she depends is challenging. Awareness is often impeded at two ends of the spectrum: a lack of informat...
Reid Holmes, Robert J. Walker
PERCOM
2007
ACM
14 years 9 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
DSN
2008
IEEE
14 years 4 months ago
Analysis and solutions to issue queue process variation
The last few years have witnessed an unprecedented explosion in transistor densities. Diminutive feature sizes have enabled microprocessor designers to break the billion-transisto...
Niranjan Soundararajan, Aditya Yanamandra, Chrysos...
SP
2008
IEEE
132views Security Privacy» more  SP 2008»
14 years 4 months ago
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication...
Mario Strasser, Christina Pöpper, Srdjan Capk...
ECBS
2007
IEEE
132views Hardware» more  ECBS 2007»
14 years 4 months ago
The Strategic Impact of Service Oriented Architectures
It has not been since the advent of the client/server architecture break through that an architectural concept has changed the face of enterprise systems so significantly as it h...
Philipp Liegl