This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
We will evaluate electronic payment (ePayment) systems by employing a use-value analysis. The key success factors of ePayment systems are security and flexibility. Not surprisingly...
Gerald Draxler, Johannes Sametinger, Andreas Wiesa...
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
— In this paper we use bilevel programming to find the maximum difference between a reference controller and a low-complexity controller in terms of the infinitynorm difference...