Sciweavers

894 search results - page 156 / 179
» Secure Implementation of Channel Abstractions
Sort
View
IACR
2011
158views more  IACR 2011»
12 years 7 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ICDAR
2003
IEEE
14 years 1 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
TWC
2011
232views more  TWC 2011»
13 years 2 months ago
Joint Detection of Primary Systems Using UWB Impulse Radios
Abstract—Regulation in Europe and Japan requires the implementation of detect-and-avoid (DAA) techniques in some bands for the coexistence of licensed primary systems and seconda...
Serhat Erküçük, Lutz H.-J. Lampe,...
EUROSYS
2009
ACM
14 years 4 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...