Sciweavers

176 search results - page 14 / 36
» The Cost of Privatization
Sort
View
CC
2006
Springer
118views System Software» more  CC 2006»
13 years 11 months ago
Lightweight Lexical Closures for Legitimate Execution Stack Access
We propose a new language concept called "L-closures" for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight...
Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa
ITCC
2005
IEEE
14 years 29 days ago
Dealing Cards in Poker Games
— This paper proposes a new protocol for shuffling and dealing cards, that is designed specifically for games of mental poker. Our protocol takes advantage of two features of p...
Philippe Golle
SODA
2000
ACM
122views Algorithms» more  SODA 2000»
13 years 8 months ago
Cooperative facility location games
The location of facilities in order to provide service for customers is a well-studied problem in the operations research literature. In the basic model, there is a predefined cos...
Michel X. Goemans, Martin Skutella
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 27 days ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
FPL
2007
Springer
154views Hardware» more  FPL 2007»
14 years 1 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...