Sciweavers

986 search results - page 48 / 198
» Protecting the Intranet Against
Sort
View
CMS
2006
13 years 10 months ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
DSN
2011
IEEE
12 years 9 months ago
Communix: A framework for collaborative deadlock immunity
—We present Communix, a collaborative deadlock immunity framework for Java programs. Deadlock immunity enables applications to avoid deadlocks that they previously encountered. D...
Horatiu Jula, Pinar Tözün, George Candea
LREC
2010
173views Education» more  LREC 2010»
13 years 10 months ago
GIS Application Improvement with Multilingual Lexical and Terminological Resources
This paper introduces the results of integration of lexical and terminological resources, most of them developed within the Human Language Technology (HLT) Group at the University...
Ranka Stankovic, Ivan Obradovic, Olivera Kitanovic
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
14 years 23 days ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
FORTE
2004
13 years 10 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber