Sciweavers

2951 search results - page 589 / 591
» Secure Distributed DNS
Sort
View
IAJIT
2011
13 years 2 months ago
An RFID-based validation system for halal food
: In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the ...
Mohd Nasir, Azah Norman, Shukor Fauzi, Masliyana A...
ASIACRYPT
2011
Springer
12 years 11 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 6 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
SIGCOMM
2012
ACM
12 years 1 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
PAMI
2012
12 years 1 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain