Sciweavers

22 search results - page 4 / 5
» A Run-Time Memory Protection Methodology
Sort
View
111
Voted
DATE
2003
IEEE
186views Hardware» more  DATE 2003»
15 years 6 months ago
Formal Methods for Integration of Automotive Software
Novel functionality, configurability and higher efficiency in automotive systems require sophisticated embedded software, as well as distributed software development between man...
Marek Jersak, Kai Richter, Rolf Ernst, Jörn-C...
132
Voted
DAMON
2006
Springer
15 years 4 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
204
Voted
SIGMOD
2006
ACM
238views Database» more  SIGMOD 2006»
16 years 28 days ago
Continuous monitoring of top-k queries over sliding windows
Given a dataset P and a preference function f, a top-k query retrieves the k tuples in P with the highest scores according to f. Even though the problem is well-studied in convent...
Kyriakos Mouratidis, Spiridon Bakiras, Dimitris Pa...
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
15 years 6 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...
152
Voted
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 3 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...