Sciweavers

92 search results - page 19 / 19
» Practical Problems with a Cryptographic Protection Scheme
Sort
View
ISCA
2010
IEEE
340views Hardware» more  ISCA 2010»
13 years 11 months ago
Necromancer: enhancing system throughput by animating dead cores
Aggressive technology scaling into the nanometer regime has led to a host of reliability challenges in the last several years. Unlike onchip caches, which can be efficiently prot...
Amin Ansari, Shuguang Feng, Shantanu Gupta, Scott ...
ACSAC
2007
IEEE
14 years 9 days ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...