Sciweavers

686 search results - page 49 / 138
» Secure Two-Party Computation Is Practical
Sort
View
STORAGESS
2005
ACM
14 years 3 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
CDC
2009
IEEE
14 years 2 months ago
Ordinal optimization based security dispatching in deregulated power systems
— Due to the uncertainty in the forecasting of load patterns, security dispatching finds the generation pattern, which is the most economic and passes all N − 1 contingencies ...
Qing-Shan Jia, Min Xie, Felix F. Wu
USS
2010
13 years 7 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
DSN
2000
IEEE
14 years 2 months ago
Fault-Secure Scheduling of Arbitrary Task Graphs to Multiprocessor Systems
In this paper, we propose new scheduling algorithms to achieve fault security in multiprocessor systems. We consider scheduling of parallel programs represented by directed acycli...
Koji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 4 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis