Sciweavers

34 search results - page 3 / 7
» Tamper Proofing 3D Models
Sort
View
EUROCRYPT
2007
Springer
13 years 11 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 19 days ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
CPM
2004
Springer
168views Combinatorics» more  CPM 2004»
13 years 11 months ago
The Protein Sequence Design Problem in Canonical Model on 2D and 3D Lattices
In this paper we investigate the protein sequence design (PSD) problem (also known as the inverse protein folding problem) under the Canonical model 4 on 2D and 3D lattices [12, 25...
Piotr Berman, Bhaskar DasGupta, Dhruv Mubayi, Robe...
EUROSEC
2009
ACM
14 years 13 days ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
VSGAMES
2010
120views Game Theory» more  VSGAMES 2010»
13 years 4 months ago
Randomly Generated 3D Environments for Serious Games
— This paper describes a variety of methods that can be used to create realistic, random 3D environments for serious games requiring real-time performance. These include the gene...
Jeremy Noghani, Fotis Liarokapis, Eike Falk Anders...