Sciweavers

6318 search results - page 135 / 1264
» Data Leakage Detection
Sort
View
ICASSP
2009
IEEE
15 years 8 months ago
Narrowband interference mitigation in BICM OFDM systems
Orthogonal frequency division multiplexing (OFDM) is noted for its resistance to narrowband interference when equipped with forward error correction. This technique along with era...
Arun Batra, James R. Zeidler
CSFW
2004
IEEE
15 years 8 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
CHES
2006
Springer
124views Cryptology» more  CHES 2006»
15 years 8 months ago
A Proposition for Correlation Power Analysis Enhancement
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (...
Thanh-Ha Le, Jessy Clédière, C&eacut...
CODES
2006
IEEE
15 years 8 months ago
Application specific forwarding network and instruction encoding for multi-pipe ASIPs
Small area and code size are two critical design issues in most of embedded system designs. In this paper, we tackle these issues by customizing forwarding networks and instructio...
Swarnalatha Radhakrishnan, Hui Guo, Sri Parameswar...
CSFW
2000
IEEE
15 years 8 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi