Sciweavers

19 search results - page 3 / 4
» Small Scale Variants of the AES
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 6 months ago
Selling Privacy at Auction
We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a t...
Arpita Ghosh, Aaron Roth
ICCAD
2008
IEEE
170views Hardware» more  ICCAD 2008»
14 years 2 months ago
Obstacle-avoiding rectilinear Steiner tree construction
— In today’s VLSI designs, there can be many blockages in a routing region. The obstacle-avoiding rectilinear Steiner minimum tree (OARSMT) problem has become an important prob...
Liang Li, Evangeline F. Y. Young
JIB
2006
78views more  JIB 2006»
13 years 6 months ago
Identification of embryo specific human isoforms using a database of predicted alternative splice forms
Alternative splicing is one of the most important mechanisms to generate a large number of mRNA and protein isoforms from a small number of genes. Its study became one of the hot ...
Heike Pospisil
CCS
2011
ACM
12 years 6 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 3 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...