Sciweavers

11603 search results - page 71 / 2321
» Securing Embedded Systems
Sort
View
134
Voted
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
CSREAPSC
2006
15 years 6 months ago
A Real Time Scheduling Method for Embedded Multimedia Applications
Byoungchul Ahn, Ji-Hoon Kim, Dong Ha Lee, Sang Hoo...
JTRES
2009
ACM
15 years 11 months ago
CDx: a family of real-time Java benchmarks
Tomás Kalibera, Jeff Hagelberg, Filip Pizlo...
WORDS
2005
IEEE
15 years 10 months ago
Empirical Assessment of Machine Learning based Software Defect Prediction Techniques
Venkata U. B. Challagulla, Farokh B. Bastani, I-Li...