Sciweavers

3420 search results - page 188 / 684
» A Language-Based Approach to Security
Sort
View
TRUST
2010
Springer
15 years 2 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
VLSID
2010
IEEE
190views VLSI» more  VLSID 2010»
15 years 2 months ago
A Reconfigurable Architecture for Secure Multimedia Delivery
This paper introduces a reconfigurable architecture for ensuring secure and real-time video delivery through a novel parameterized construction of the Discrete Wavelet Transform (D...
Amit Pande, Joseph Zambreno
SAC
2011
ACM
14 years 7 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez
PERCOM
2005
ACM
16 years 4 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
CSR
2009
Springer
15 years 11 months ago
A Feebly Secure Trapdoor Function
Abstract. In 1992, A. Hiltgen [1] provided the first constructions of provably (slightly) secure cryptographic primitives, namely feebly one-way functions. These functions are pro...
Edward A. Hirsch, Sergey I. Nikolenko