Sciweavers

2927 search results - page 39 / 586
» Secure Distributed Human Computation
Sort
View
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DAC
2009
ACM
13 years 5 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
CTRSA
2001
Springer
109views Cryptology» more  CTRSA 2001»
14 years 12 days ago
Uncheatable Distributed Computations
Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Intern...
Philippe Golle, Ilya Mironov
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
RE
2001
Springer
14 years 9 days ago
An Empirical Study of Facilitation of Computer-Mediated Distributed Requirements Negotiations
Group facilitation is an important element of group approaches to Requirements Engineering (RE). The facilitation in ‘traditional’ face-to-face groups is challenged by the inc...
Daniela E. Damian, Mildred L. G. Shaw, Armin Eberl...