Sciweavers

1816 search results - page 192 / 364
» Trace oblivious computation
Sort
View
CAISE
2005
Springer
14 years 2 months ago
Meeting Decision Follow-up and Task Management
Meeting is one of the most common places where decisions are made. However, since there is hardly any formal documentation concerning decisions made in meetings, it turns out to be...
Carla Valle, John Koh
CCS
2005
ACM
14 years 2 months ago
Untraceable RFID tags via insubvertible encryption
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain u...
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiro...
EUROPAR
2005
Springer
14 years 2 months ago
The Periodic-Linear Model of Program Behavior Capture
Abstract. Understanding and controlling program behavior is a challenging objective for the design of advanced compilers and critical system development. In this paper, we propose ...
Philippe Clauss, Bénédicte Kenmei, J...
FPL
2005
Springer
138views Hardware» more  FPL 2005»
14 years 2 months ago
Snort Offloader: A Reconfigurable Hardware NIDS Filter
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
ICCS
2005
Springer
14 years 2 months ago
On the Impact of Reservations from the Grid on Planning-Based Resource Management
Advance Reservations are an important concept to support QoS and Workflow Scheduling in Grid environments. However, the impact of reservations from the Grid on the performance of ...
Felix Heine, Matthias Hovestadt, Odej Kao, Achim S...