Sciweavers

113 search results - page 5 / 23
» Computing the Leakage of Information-Hiding Systems
Sort
View
103
Voted
JCSC
2002
129views more  JCSC 2002»
14 years 9 months ago
Leakage Current Reduction in VLSI Systems
There is a growing need to analyze and optimize the stand-by component of power in digital circuits designed for portable and battery-powered applications. Since these circuits re...
David Blaauw, Steven M. Martin, Trevor N. Mudge, K...
CCGRID
2004
IEEE
15 years 1 months ago
The virtual resource manager: an architecture for SLA-aware resource management
The next generation Grid will demand the Grid middleware to provide flexibility, transparency, and reliability. This implies the appliance of service level agreements to guarantee...
Lars-Olof Burchard, Matthias Hovestadt, Odej Kao, ...
86
Voted
FOCS
2010
IEEE
14 years 7 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 4 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
ESORICS
2008
Springer
14 years 11 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf