Sciweavers

187 search results - page 23 / 38
» PRIVATE-IYE: A Framework for Privacy Preserving Data Integra...
Sort
View
CHES
2005
Springer
85views Cryptology» more  CHES 2005»
14 years 1 months ago
Secure Data Management in Trusted Computing
Abstract. In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software updat...
Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahm...
ACSAC
2005
IEEE
14 years 1 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
ET
2010
89views more  ET 2010»
13 years 6 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard
EVOW
2005
Springer
14 years 1 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
PR
2010
145views more  PR 2010»
13 years 6 months ago
Graph-optimized locality preserving projections
Locality preserving projections (LPP) is a typical graph-based dimensionality reduction (DR) method, and has been successfully applied in many practical problems such as face recog...
Limei Zhang, Lishan Qiao, Songcan Chen