Sciweavers

986 search results - page 20 / 198
» Protecting the Intranet Against
Sort
View
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
CCS
2009
ACM
14 years 2 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
ASPLOS
2012
ACM
12 years 3 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
ACSAC
1999
IEEE
14 years 6 days ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
IEAAIE
2007
Springer
14 years 2 months ago
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection
With the exponential growth of digital materials in this age, the protection of Intellectual Property Right (IPR) becomes an important and urgent topic. In this paper, we propose a...
Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Ch...