Sciweavers

367 search results - page 49 / 74
» The Return of the Sensitivity Attack
Sort
View
ATC
2008
Springer
13 years 9 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
CCS
2008
ACM
13 years 9 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
DBSEC
2008
196views Database» more  DBSEC 2008»
13 years 9 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
AAAI
2006
13 years 9 months ago
Predicting Task-Specific Webpages for Revisiting
With the increased use of the web has come a corresponding increase in information overload that users face when trying to locate specific webpages, especially as a majority of vi...
Arwen Twinkle Lettkeman, Simone Stumpf, Jed Irvine...
OPODIS
2004
13 years 9 months ago
Robust Topology Control Protocols
Topology control protocols attempt to reduce the energy consumption of nodes in an ad-hoc wireless network while maintaining sufficient network connectivity. Topology control proto...
Sukumar Ghosh, Kevin M. Lillis, Saurav Pandit, Sri...