Sciweavers

1005 search results - page 133 / 201
» Practical Secure Function Evaluation
Sort
View
148
Voted
CLUSTER
1999
IEEE
15 years 8 days ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz
79
Voted
OOPSLA
2010
Springer
14 years 11 months ago
Back to the futures: incremental parallelization of existing sequential runtime systems
Many language implementations, particularly for high-level and scripting languages, are based on carefully honed runtime systems that have an internally sequential execution model...
James Swaine, Kevin Tew, Peter A. Dinda, Robert Br...
IACR
2011
113views more  IACR 2011»
14 years 7 days ago
GNUC: A New Universal Composability Framework
We put forward a framework for the modular design and analysis of multi-party protocols. Our framework is called “GNUC” (with the recursive meaning “GNUC’s Not UC”), alr...
Dennis Hofheinz, Victor Shoup
99
Voted
ACSAC
2007
IEEE
15 years 7 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
107
Voted
IEEEARES
2010
IEEE
15 years 2 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...