Sciweavers

Share
SP
2010
IEEE
204views Security Privacy» more  SP 2010»
8 years 8 months ago
Acceleration of a CFD code with a GPU
The Computational Fluid Dynamics code Overflow includes as one of its solver options an algorithm which is a fairly small piece of code but which accounts for a significant portio...
Dennis C. Jespersen
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
8 years 11 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
8 years 11 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
8 years 11 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
8 years 11 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
8 years 11 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
8 years 12 months ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...
SP
2010
IEEE
150views Security Privacy» more  SP 2010»
8 years 12 months ago
Scheduling two-sided transformations using tile algorithms on multicore architectures
Hatem Ltaief, Jakub Kurzak, Jack Dongarra, Rosa M....
SP
2010
IEEE
179views Security Privacy» more  SP 2010»
8 years 12 months ago
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zh...
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
9 years 5 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
books