Sciweavers

319 search results - page 39 / 64
» Controlled Secret Leakage
Sort
View
DAC
2002
ACM
14 years 9 months ago
DRG-cache: a data retention gated-ground cache for low power
In this paper we propose a novel integrated circuit and architectural level technique to reduce leakage power consumption in high performance cache memories using single Vt (trans...
Amit Agarwal, Hai Li, Kaushik Roy
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
14 years 2 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
IBMRD
2007
47views more  IBMRD 2007»
13 years 8 months ago
Cell Broadband Engine processor vault security architecture
    Current data protection technologies such as those based on public‐key encryption and broadcast  encryption  focus  on  the  secure  control  and  prote...
Kanna Shimizu, H. Peter Hofstee, John S. Liberty
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
COMPSAC
2010
IEEE
13 years 6 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...