Sciweavers

1005 search results - page 49 / 201
» Practical Secure Function Evaluation
Sort
View
CCS
2009
ACM
14 years 9 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
ACISP
2006
Springer
14 years 2 months ago
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
Nicolas Courtois, Blandine Debraize, Eric Garrido
ICC
1997
IEEE
113views Communications» more  ICC 1997»
14 years 1 months ago
Improved Performance QPSK Demodulator for Digital Satellite Radio
: Practical realizations of the optimum closed loop structure for coherent demodulation of QPSK signals demands the approximation of the hyperbolic tangent nonlinearity (Tanh) with...
Alexandre G. Melo, Henrique J. A. da Silva
INFOCOM
2012
IEEE
11 years 11 months ago
Secure top-k query processing via untrusted location-based service providers
Abstract—This paper considers a novel distributed system for collaborative location-based information generation and sharing which become increasingly popular due to the explosiv...
Rui Zhang 0007, Yanchao Zhang, Chi Zhang
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 22 days ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...