Sciweavers

160 search results - page 20 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
JAPLL
2008
91views more  JAPLL 2008»
13 years 7 months ago
Undoing the effects of action sequences
In this paper, we study the following basic problem: After having executed a sequence of actions, find a sequence of actions that brings the agent back to the state just before th...
Thomas Eiter, Esra Erdem, Wolfgang Faber
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 20 days ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
CN
2007
80views more  CN 2007»
13 years 7 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
ICRA
2007
IEEE
143views Robotics» more  ICRA 2007»
14 years 1 months ago
Color Registration of Underwater Images for Underwater Sensing with Consideration of Light Attenuation
Abstract— Colors of objects observed in underwater environments are different from those in air. This is because the light intensity decreases with the distance from objects in w...
Atsushi Yamashita, Megumi Fujii, Toru Kaneko