Sciweavers

2259 search results - page 8 / 452
» Separation and information hiding
Sort
View
72
Voted
SIGSOFT
2005
ACM
15 years 10 months ago
Information hiding interfaces for aspect-oriented design
The growing popularity of aspect-oriented languages, such as AspectJ, and of corresponding design approaches, makes it important to learn how best to modularize programs in which ...
Kevin J. Sullivan, William G. Griswold, Yuanyuan S...
ASPLOS
2004
ACM
15 years 2 months ago
HIDE: an infrastructure for efficiently protecting information leakage on the address bus
+ XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper resistant execution. XOM provides support for encryption/decryption and integrit...
Xiaotong Zhuang, Tao Zhang, Santosh Pande
IH
1998
Springer
15 years 1 months ago
Reliable Blind Information Hiding for Images
Lisa M. Marvel, Charles G. Boncelet Jr., Charles T...
74
Voted
MDM
2007
Springer
123views Communications» more  MDM 2007»
15 years 3 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
COMAD
2008
14 years 11 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang