Sciweavers

518 search results - page 83 / 104
» Abstract Interpretation-Based Protection
Sort
View
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
15 years 3 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 3 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
ECOOPWEXCEPTION
2006
Springer
15 years 3 months ago
Exception Handling in the Choices Operating System
Exception handling is a powerful abstraction that can be used to help manage errors and support the construction of reliable operating systems. Using exceptions to notify system co...
Francis M. David, Jeffrey C. Carlyle, Ellick Chan,...
EUROCRYPT
2006
Springer
15 years 3 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
EURONGI
2006
Springer
15 years 3 months ago
Self-protection in P2P Networks: Choosing the Right Neighbourhood
Abstract. In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and f...
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, ...