Sciweavers

19 search results - page 3 / 4
» The digital set-top box as a virtual channel provider
Sort
View
CASES
2010
ACM
13 years 3 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 5 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
SOSP
2007
ACM
14 years 2 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan
ACSAC
2005
IEEE
13 years 10 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
13 years 3 months ago
To Cooperate or Not: A Capacity Perspective
Abstract—It is widely recognized that differential decode-andforward (DDF) cooperative transmission scheme is capable of providing a superior performance compared to classic dire...
Li Wang, Lingkun Kong, Soon Xin Ng, Lajos Hanzo