Sciweavers

1462 search results - page 267 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
NOSSDAV
2005
Springer
14 years 26 days ago
ACE: an active, client-directed method for reducing energy during web browsing
In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transit...
Haijin Yan, David K. Lowenthal, Kang Li
ECUMN
2004
Springer
13 years 11 months ago
UMTS-WLAN Service Integration at Core Network Level
The integration of wireless LANs (WLANs) and 3G systems performed at core network level requires very little modifications to the current 3GPP architecture and provides a large set...
Paulo Pinto, Luis Bernardo, Pedro Sobral
ASPLOS
2009
ACM
14 years 8 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
ACISP
2004
Springer
14 years 24 days ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen
SIGOPS
2008
146views more  SIGOPS 2008»
13 years 7 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...