Sciweavers

1949 search results - page 50 / 390
» Protective Interface Specifications
Sort
View
OOPSLA
2000
Springer
13 years 11 months ago
An approach to safe object sharing
It is essential for security to be able to isolate mistrusting programs from one another, and to protect the host platform from programs. Isolation is difficult in object-oriented...
Ciarán Bryce, Chrislain Razafimahefa
MMS
2008
13 years 7 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
ICRA
2000
IEEE
95views Robotics» more  ICRA 2000»
14 years 1 days ago
Designing with Haptic Feedback
Haptic feedback is a design element for human-computer interfaces, and this paper discusses when and how it can be used to best effect in interactive applications. It begins with ...
Karon E. MacLean
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
13 years 11 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
30
Voted
SIES
2009
IEEE
14 years 2 months ago
A flexible design flow for software IP binding in commodity FPGA
— Software intellectual property (SWIP) is a critical component of increasingly complex FPGA based system on chip (SOC) designs. As a result, developers want to ensure that their...
Michael Gora, Abhranil Maiti, Patrick Schaumont