Nanoelectronic components are expected to suffer from very high error rates, implying the need for hardening techniques. We propose a fine-grained approach to harden a promising...
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Of several possible forms of human-robot collaborative manipulation, we focus on the case where the human and the robot jointlymanipulate a common load. In our formulation, the ro...
Tanya Tickel, David Hannon, Kevin M. Lynch, Michae...