Sciweavers

976 search results - page 12 / 196
» Evaluating Adversarial Partitions
Sort
View
DATE
2004
IEEE
159views Hardware» more  DATE 2004»
15 years 1 months ago
Compositional Memory Systems for Data Intensive Applications
To alleviate the system performance unpredictability of multitasking applications running on multiprocessor platforms with shared memory hierarchies we propose a task level set ba...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...
IH
2004
Springer
15 years 3 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 2 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
INFORMATIKTAGE
2008
14 years 11 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
15 years 2 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...