Sciweavers

1627 search results - page 298 / 326
» High Security Smartcards
Sort
View
145
Voted
TPDS
2008
116views more  TPDS 2008»
15 years 3 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
OOPSLA
2010
Springer
15 years 1 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
184
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Hera-JVM: a runtime system for heterogeneous multi-core architectures
Heterogeneous multi-core processors, such as the IBM Cell processor, can deliver high performance. However, these processors are notoriously difficult to program: different cores...
Ross McIlroy, Joe Sventek
124
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
110
Voted
ICIP
2010
IEEE
15 years 1 months ago
Resolving distortion between linear and area sensors for forensic print inspection
: Resolving distortion between linear and area sensors for forensic print inspection Stephen B. Pollard, Guy B. Adams, Steven J. Simske HP Laboratories HPL-2010-172 Security print...
Stephen B. Pollard, Guy B. Adams, Steven J. Simske