Sciweavers

1005 search results - page 34 / 201
» Practical Secure Function Evaluation
Sort
View
CIIA
2009
13 years 10 months ago
Practical Use of an Audiometer Based on a Computer Software for Hearing Loss Screening
The project aimed at developing a software audiometer for hearing loss screening. The proposed software is definitely based on the internal peripherals of the computer without any ...
Ykhlef Fayçal, W. Benzaba, L. Bendaouia, A....
JSSPP
2005
Springer
14 years 2 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
JHSN
2006
95views more  JHSN 2006»
13 years 8 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 4 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
CHES
2007
Springer
94views Cryptology» more  CHES 2007»
14 years 3 months ago
MAME: A Compression Function with Reduced Hardware Requirements
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 25...
Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, J...