Sciweavers

1890 search results - page 335 / 378
» Querying Big Data by Accessing Small Data
Sort
View
90
Voted
USS
2010
14 years 8 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
88
Voted
ISCA
2006
IEEE
123views Hardware» more  ISCA 2006»
15 years 5 months ago
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Protection from hardware attacks such as snoopers and mod chips has been receiving increasing attention in computer architecture. This paper presents a new combined memory encrypt...
Chenyu Yan, Daniel Englender, Milos Prvulovic, Bri...
75
Voted
HIPEAC
2005
Springer
15 years 4 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
93
Voted
DATE
2005
IEEE
138views Hardware» more  DATE 2005»
15 years 26 days ago
BB-GC: Basic-Block Level Garbage Collection
Memory space limitation is a serious problem for many embedded systems from diverse application domains. While circuit/packaging techniques are definitely important to squeeze la...
Ozcan Ozturk, Mahmut T. Kandemir, Mary Jane Irwin
73
Voted
MASCOTS
2004
15 years 9 days ago
Reliability of MEMS-Based Storage Enclosures
MEMS-based storage is a new, non-volatile storage technology currently under development. It promises fast data access, high throughput, high storage density, small physical size,...
Bo Hong, Thomas J. E. Schwarz, Scott A. Brandt, Da...