Sciweavers

5722 search results - page 288 / 1145
» Security Function Interactions
Sort
View
143
Voted
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
14 years 3 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
124
Voted
ASPLOS
2006
ACM
15 years 9 months ago
Introspective 3D chips
While the number of transistors on a chip increases exponentially over time, the productivity that can be realized from these systems has not kept pace. To deal with the complexit...
Shashidhar Mysore, Banit Agrawal, Navin Srivastava...
138
Voted
MOBICOM
2004
ACM
15 years 8 months ago
Analyzing the spread of active worms over VANET
Interactive communications among nodes in Vehicular Ad Hoc Networks (VANET) and the safety-oriented nature of many VANET applications necessitate a robust security framework. An a...
Syed A. Khayam, Hayder Radha
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
15 years 3 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
ICIP
2007
IEEE
16 years 5 months ago
Enabling Better Medical Image Classification Through Secure Collaboration
Privacy is of growing concern in today's day and age. Protecting the privacy of health data is of paramount importance. With the rapid advancement in imaging technology, anal...
Jaideep Vaidya, Bhakti Tulpule