Sciweavers

24188 search results - page 235 / 4838
» Computing on Encrypted Data
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Creating and evolving software by searching, selecting and synthesizing relevant source code
When programmers develop or maintain software, they instinctively sense that there are fragments of code that other developers implemented somewhere, and these code fragments coul...
Denys Poshyvanyk, Mark Grechanik
131
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Secure image retrieval through feature protection
This paper addresses the problem of image retrieval from an encrypted database, where data confidentiality is preserved both in the storage and retrieval process. The paper focus...
Wenjun Lu, Avinash L. Varna, Ashwin Swaminathan, M...
APLAS
2009
ACM
15 years 10 months ago
The Higher-Order, Call-by-Value Applied Pi-Calculus
We define a higher-order process calculus with algebraic operations such as encryption and decryption, and develop a bisimulation proof method for behavioral equivalence in this c...
Nobuyuki Sato, Eijiro Sumii
113
Voted
ISCAS
2007
IEEE
120views Hardware» more  ISCAS 2007»
15 years 9 months ago
DPA Using Phase-Based Waveform Matching against Random-Delay Countermeasure
— We propose Differential Power Analysis (DPA) with a phase-based waveform matching technique. Conventionally, a trigger signal and a system clock are used to capture the wavefor...
Sei Nagashima, Naofumi Homma, Yuichi Imai, Takafum...
128
Voted
ITNG
2007
IEEE
15 years 9 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal