Sciweavers

1663 search results - page 14 / 333
» Computer Security in the Real World
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
DAC
1999
ACM
14 years 8 months ago
Verification of a Microprocessor Using Real World Applications
You-Sung Chang, Seungjong Lee, In-Cheol Park, Chon...
AINA
2006
IEEE
14 years 1 months ago
Communication between Outdoor Field and Immersive Virtual Environment
This paper proposes the concept of the hybrid information space that integrates the information space seamlessly between the real world and the virtual world, and the prototype sy...
Tetsuro Ogi, Tetsuro Fujise
HPCA
2011
IEEE
12 years 11 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
TGC
2010
Springer
13 years 5 months ago
Probabilistic Aspects: Checking Security in an Imperfect World
Chris Hankin, Flemming Nielson, Hanne Riis Nielson