Sciweavers

1448 search results - page 53 / 290
» Restricted Stack Implementations
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...
WISTP
2009
Springer
14 years 2 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
IPPS
2007
IEEE
14 years 1 months ago
Client-Side Implementation of Dynamic Asynchronous Invocations for Web Services
Web Services are becoming more and more fundamental building blocks of Web-based distributed applications and a core technology for Grid systems. Due to their flexibility, Web Ser...
Giancarlo Tretola, Eugenio Zimeo
WETICE
2003
IEEE
14 years 27 days ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
RTAS
2002
IEEE
14 years 16 days ago
Experiences in Implementing an Energy-Driven Task Scheduler in RT-Linux
Dynamic voltage scaling (DVS) is being increasingly used for power management in embedded systems. Energy is a scarce resource in embedded real-time systems and energy consumption...
Vishnu Swaminathan, Charles B. Schweizer, Krishnen...