Sciweavers

1528 search results - page 140 / 306
» Implementing Generalized Operator Overloading
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
OSN
2011
14 years 9 months ago
Performance modeling of HS-RR-TCP over load-balanced optical burst-switched (OBS) networks
TCP-over-OBS is a promising transport paradigm to support next-generation Internet. It is well-known that loadbalanced routing generally improves loss performance over OBS. We ide...
Neal Charbonneau, Vinod Vokkarane
WWW
2011
ACM
14 years 9 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
SAC
2011
ACM
14 years 5 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
CODASPY
2012
13 years 10 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...