Sciweavers

121 search results - page 9 / 25
» Oblivious transfer with access control
Sort
View
ER
2010
Springer
124views Database» more  ER 2010»
13 years 5 months ago
Integrity Assurance for RESTful XML
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast...
Sebastian Graf, Lukas Lewandowski, Marcel Waldvoge...
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
14 years 2 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
WMPI
2004
ACM
14 years 29 days ago
SCIMA-SMP: on-chip memory processor architecture for SMP
Abstract. In this paper, we propose a processor architecture with programmable on-chip memory for a high-performance SMP (symmetric multi-processor) node named SCIMA-SMP (Software ...
Chikafumi Takahashi, Masaaki Kondo, Taisuke Boku, ...
VTC
2010
IEEE
110views Communications» more  VTC 2010»
13 years 5 months ago
Internet Access Performance in LTE TDD
The Time Division Duplex (TDD) uplink-downlink configuration of the 3GPP Long Term Evolution (LTE) determines how the ten subframes in a radio frame are divided between the downlin...
Riikka Susitaival, Henning Wiemann, J. Ostergaard,...
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...