Sciweavers

1795 search results - page 112 / 359
» Security Models and Information Flow
Sort
View
ACISP
2001
Springer
15 years 8 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
ISI
2006
Springer
15 years 3 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
ICPR
2000
IEEE
16 years 4 months ago
Statistical Motion-Based Object Indexing Using Optic Flow Field
In this paper, we propose an original approach for content-based video indexing and retrieval. It relies on the tracking of entities of interest and the analysis of their apparent...
Ronan Fablet, Patrick Bouthemy
ISPASS
2009
IEEE
15 years 10 months ago
Experiment flows and microbenchmarks for reverse engineering of branch predictor structures
Insights into branch predictor organization and operation can be used in architecture-aware compiler optimizations to improve program performance. Unfortunately, such details are ...
Vladimir Uzelac, Aleksandar Milenkovic
ASPLOS
2004
ACM
15 years 9 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande