Sciweavers

2454 search results - page 161 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISW
2010
Springer
14 years 11 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
CCS
2008
ACM
15 years 3 months ago
SOMA: mutual approval for included content in web pages
Unrestricted information flows are a key security weakness of current web design. Cross-site scripting, cross-site request forgery, and other attacks typically require that inform...
Terri Oda, Glenn Wurster, Paul C. van Oorschot, An...
CODES
2004
IEEE
15 years 5 months ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
MICRO
2010
IEEE
130views Hardware» more  MICRO 2010»
14 years 11 months ago
Pseudo-Circuit: Accelerating Communication for On-Chip Interconnection Networks
As the number of cores on a single chip increases with more recent technologies, a packet-switched on-chip interconnection network has become a de facto communication paradigm for ...
Minseon Ahn, Eun Jung Kim
SIGCOMM
2010
ACM
15 years 1 months ago
PixNet: LCD-camera pairs as communication links
Given the abundance of cameras and LCDs in today's environment, there exists an untapped opportunity for using these devices for communication. Specifically, cameras can tune...
Samuel David Perli, Nabeel Ahmed, Dina Katabi