Sciweavers

675 search results - page 96 / 135
» New reals: Can live with them, can live without them
Sort
View
IH
2005
Springer
14 years 1 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
CF
2004
ACM
14 years 1 months ago
The happy marriage of architecture and application in next-generation reconfigurable systems
New applications and standards are first conceived only for functional correctness and without concerns for the target architecture. The next challenge is to map them onto an arch...
Ingrid Verbauwhede, Patrick Schaumont
EUROCRYPT
2004
Springer
14 years 1 months ago
Dining Cryptographers Revisited
Abstract. Dining cryptographers networks (or DC-nets) are a privacypreserving primitive devised by Chaum for anonymous message publication. A very attractive feature of the basic D...
Philippe Golle, Ari Juels
IEEEAMS
2003
IEEE
14 years 28 days ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
ACSAC
2002
IEEE
14 years 19 days ago
A Security Architecture for Object-Based Distributed Systems
Large-scale distributed systems present numerous security problems not present in local systems. In this paper we present a general security architecture for a large-scale object-...
Bogdan C. Popescu, Maarten van Steen, Andrew S. Ta...