Sciweavers

3452 search results - page 657 / 691
» Secure Data Outsourcing
Sort
View
99
Voted
IACR
2011
86views more  IACR 2011»
14 years 2 days ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ICC
2007
IEEE
186views Communications» more  ICC 2007»
15 years 6 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 2 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
DAC
2009
ACM
16 years 1 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
102
Voted
CHI
2009
ACM
16 years 1 months ago
Natural throw and tilt interaction between mobile phones and distant displays
Raimund Dachselt University of Magdeburg Faculty of Computer Science User Interface & Software Engineering Group 39106 Magdeburg, Germany dachselt@acm.org Robert Buchholz Unive...
Raimund Dachselt, Robert Buchholz