Sciweavers

5484 search results - page 1011 / 1097
» Almost-Everywhere Secure Computation
Sort
View
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 3 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
COOPIS
2004
IEEE
15 years 3 months ago
Learning Classifiers from Semantically Heterogeneous Data
Semantically heterogeneous and distributed data sources are quite common in several application domains such as bioinformatics and security informatics. In such a setting, each dat...
Doina Caragea, Jyotishman Pathak, Vasant Honavar
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 3 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
CIKM
2006
Springer
15 years 3 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
DRM
2006
Springer
15 years 3 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
« Prev « First page 1011 / 1097 Last » Next »