Sciweavers

11603 search results - page 71 / 2321
» Securing Embedded Systems
Sort
View
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
CSREAPSC
2006
13 years 10 months ago
A Real Time Scheduling Method for Embedded Multimedia Applications
Byoungchul Ahn, Ji-Hoon Kim, Dong Ha Lee, Sang Hoo...
JTRES
2009
ACM
14 years 3 months ago
CDx: a family of real-time Java benchmarks
Tomás Kalibera, Jeff Hagelberg, Filip Pizlo...
WORDS
2005
IEEE
14 years 2 months ago
Empirical Assessment of Machine Learning based Software Defect Prediction Techniques
Venkata U. B. Challagulla, Farokh B. Bastani, I-Li...