Sciweavers

1627 search results - page 13 / 326
» High Security Smartcards
Sort
View
WDAG
2007
Springer
128views Algorithms» more  WDAG 2007»
15 years 5 months ago
From Crash-Stop to Permanent Omission: Automatic Transformation and Weakest Failure Detectors
Abstract. This paper studies the impact of omission failures on asynchronous distributed systems with crash-stop failures. We provide two different transformations for algorithms,...
Carole Delporte-Gallet, Hugues Fauconnier, Felix C...
ACSAC
2007
IEEE
15 years 6 months ago
Secure Input for Web Applications
The web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the web. Although the web is ...
Martin Szydlowski, Christopher Kruegel, Engin Kird...
VLDB
2002
ACM
165views Database» more  VLDB 2002»
14 years 11 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
PET
2004
Springer
15 years 5 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 4 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev