Sciweavers

141 search results - page 7 / 29
» Optimal-in-expectation redistribution mechanisms
Sort
View
DRM
2005
Springer
14 years 1 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
SCN
2008
Springer
119views Communications» more  SCN 2008»
13 years 7 months ago
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
In the last few years, live pay-TV system via internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content prote...
Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshi...
PADL
2010
Springer
14 years 4 months ago
Skeleton Composition Using Remote Data
Abstract. Skeletons simplify parallel programming by providing general patterns of parallel computations. When several skeletons are used inside the same program, skeleton composit...
Mischa Dieterle, Thomas Horstmeyer, Rita Loogen
SECON
2010
IEEE
13 years 5 months ago
A Two-Tier Market for Decentralized Dynamic Spectrum Access in Cognitive Radio Networks
Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, we propose a two-tier market for decentrali...
Dan Xu, Xin Liu, Zhu Han