Sciweavers

166 search results - page 1 / 34
» Protecting Applications with Transient Authentication
Sort
View
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 2 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
ASPLOS
2012
ACM
12 years 7 months ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...
BIOSIG
2007
90views Biometrics» more  BIOSIG 2007»
14 years 19 days ago
Cryptographic protection of biometric templates: Chance, challenges and applications
: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The ...
Ulrike Korte, Rainer Plaga
DFT
2007
IEEE
135views VLSI» more  DFT 2007»
14 years 5 months ago
Fault Secure Encoder and Decoder for Memory Applications
We introduce a reliable memory system that can tolerate multiple transient errors in the memory words as well as transient errors in the encoder and decoder (corrector) circuitry....
Helia Naeimi, André DeHon