Sciweavers

319 search results - page 9 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
RTSS
2003
IEEE
14 years 4 months ago
Rotational-Position-Aware Real-Time Disk Scheduling Using a Dynamic Active Subset (DAS)
Scheduling disk requests with service guarantees has to bring the demand to meet guarantees in line with the need to optimize disk utilization. This paper presents the design, imp...
Lars Reuther, Martin Pohlack
EUROCRYPT
2004
Springer
14 years 4 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 11 months ago
GNSS-based positioning: Attacks and Countermeasures
Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to prov...
P. Papadimitratos, A. Jovanovic
ESORICS
2008
Springer
14 years 20 days ago
A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...
COMCOM
2011
13 years 5 months ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...