Sciweavers

9 search results - page 1 / 2
» Breaking the memory secrecy assumption
Sort
View
EUROSEC
2009
ACM
13 years 11 months ago
Breaking the memory secrecy assumption
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
PODC
2004
ACM
13 years 10 months ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
VMCAI
2009
Springer
13 years 11 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
EUROCRYPT
2006
Springer
13 years 8 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
PDC
2004
ACM
13 years 10 months ago
Participatory design with individuals who have amnesia
We present experiences and insights into participatory design with individuals who have anterograde amnesia and therefore have extreme difficulty storing new memories. We discuss ...
Mike Wu, Brian Richards, Ronald Baecker