Sciweavers

319 search results - page 44 / 64
» Controlled Secret Leakage
Sort
View
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
13 years 12 months ago
Verification of K-step opacity and analysis of its complexity
In this paper, we analyze the verification of K-step opacity in discrete event systems that are modeled as (possibly non-deterministic) finite automata with partial observation on ...
Anooshiravan Saboori, Christoforos N. Hadjicostis
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 3 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
EUROCRYPT
2004
Springer
14 years 1 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
DAC
2009
ACM
14 years 9 months ago
Process variation characterization of chip-level multiprocessors
Within-die variation in leakage power consumption is substantial and increasing for chip-level multiprocessors (CMPs) and multiprocessor systems-on-chip. Dealing with this problem...
Lide Zhang, Lan S. Bai, Robert P. Dick, Li Shang, ...