Sciweavers

1816 search results - page 111 / 364
» Trace oblivious computation
Sort
View
IH
2007
Springer
14 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
ICALP
2005
Springer
14 years 3 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
MOBICOM
2010
ACM
13 years 10 months ago
MIMO rate adaptation in 802.11n wireless networks
This paper studies MIMO based rate adaptation (RA) in 802.11n wireless networks. Our case study shows that existing RA algorithms offer much lower throughput than even a fixed-rat...
Ioannis Pefkianakis, Yun Hu, Starsky H. Y. Wong, H...
ECCC
2007
123views more  ECCC 2007»
13 years 10 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters
VC
2008
172views more  VC 2008»
13 years 10 months ago
Consistent mesh partitioning and skeletonisation using the shape diameter function
Abstract Mesh partitioning and skeletonisation are fundamental for many computer graphics and animation techniques. Because of the close link between an object's skeleton and ...
Lior Shapira, Ariel Shamir, Daniel Cohen-Or