Sciweavers

1949 search results - page 1 / 390
» Protective Interface Specifications
Sort
View
TAPSOFT
1997
Springer
13 years 8 months ago
Protective Interface Specifications
Gary T. Leavens, Jeannette M. Wing
ICONFERENCE
2011
12 years 11 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
ASPLOS
2004
ACM
13 years 10 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
CSREASAM
2006
13 years 6 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
EMSOFT
2009
Springer
13 years 11 months ago
Modal interfaces: unifying interface automata and modal specifications
Jean-Baptiste Raclet, Eric Badouel, Albert Benveni...