Sciweavers

2192 search results - page 91 / 439
» Embedded function composition
Sort
View
FOCS
2003
IEEE
14 years 4 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell
BMCBI
2005
132views more  BMCBI 2005»
13 years 11 months ago
Correlation and prediction of gene expression level from amino acid and dipeptide composition of its protein
Background: A large number of papers have been published on analysis of microarray data with particular emphasis on normalization of data, detection of differentially expressed ge...
Gajendra P. S. Raghava, Joon H. Han
EUROCRYPT
2008
Springer
14 years 28 days ago
Obfuscating Point Functions with Multibit Output
We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero ev...
Ran Canetti, Ronny Ramzi Dakdouk
GI
2004
Springer
14 years 4 months ago
Model-based Middleware for Embedded Systems
: In this paper we describe the advantages of a model-based approach to embedded component middleware. Component infrastructures such as Enterprise JavaBeans, Microsoft’s COM+ an...
Chris Salzmann, Martin Thiede, Markus Völter
ACSAC
2003
IEEE
14 years 2 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...