Sciweavers

63 search results - page 4 / 13
» ccs 2011
Sort
View
CCS
2011
ACM
12 years 6 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
CCS
2011
ACM
12 years 6 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
CGF
2011
12 years 10 months ago
Exploring Collections of Tagged Text for Literary Scholarship
Modern literary scholars must combine access to vast collections of text with the traditional close analysis of their field. In this paper, we discuss the design and development ...
M. Correll, M. Witmore, M. Gleicher
CGF
2011
12 years 10 months ago
Dynamic Insets for Context-Aware Graph Navigation
Maintaining both overview and detail while navigating in graphs, such as road networks, airline route maps, or social networks, is difficult, especially when targets of interest ...
S. Ghani, N. Henry Riche, N. Elmqvist
CCS
2011
ACM
12 years 6 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...