Filters








66 Hits in 13.0 sec

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
Here we found the top 150 applications that we divided into the following categories: digital control, communication interfaces, networking, computer security, cryptography techniques, machine learning  ...  Also, we present an evolution and trend analysis of the related applications.  ...  In Proceedings of the 2015 IEEE 23rd Annual Symposium on High-Performance Interconnects, Santa Clara, CA, USA, 26-28 August 2015. 284. Zhao, T.; Li, T.; Han, B.; Sun, Z.; Huang, J.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing

Peter Mayer, Melanie Volkamer
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
In terms of storage, the (t, n)-threshold verification scheme outperforms the naive approach in all settings and it offers lower computation times in most settings.  ...  In this paper we propose the (t, n)-threshold verification scheme, a novel scheme using Blakley secret sharing to provide secure verification of all authorized subsets of the password.  ...  This work has been developed within the project 'KMU AWARE' which is funded by the German Federal Ministry for Economic Affairs and Energy under grant no. BMWi-VIA5-090168623-01-1/2015.  ... 
doi:10.1145/2818000.2818043 dblp:conf/acsac/MayerV15 fatcat:vszzpwx2tffztf36ytahs3iqqm

SeSQLite: Security Enhanced SQLite

Simone Mutti, Enrico Bacis, Stefano Paraboschi
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
This permits the management of a fine-grained access policy for database objects. A prototype has been implemented and it has been used to improve the security of Android Content Providers.  ...  However, SELinux provides per-file protection, thus the database file is treated as an atomic unit, impeding the definition of a fine-grained mandatory access control (MAC) policy for database objects.  ...  ACSAC ' 15 , 15 December 07-11, 2015, Los Angeles, CA, USA c 2016 ACM.  ... 
doi:10.1145/2818000.2818041 dblp:conf/acsac/MuttiBP15 fatcat:qs7inhnj7jggjax7nha4cmo6vu

Logical Partitions on Many-Core Platforms

Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
We implement the proposed change for the Intel Single-Chip Cloud Computer (SCC).  ...  In this paper, we show that a simple address-space isolation mechanism, that can be implemented in the Networkon-Chip of the many-core processor, is sufficient to enable logical partitions.  ...  This work was partially supported by the Zurich Information Security and Privacy Center. It represents the views of the authors.  ... 
doi:10.1145/2818000.2818026 dblp:conf/acsac/MastiMKSC15 fatcat:3fd66wzpwbeabn4a2egxq4oevq

Report of the Executive Committee for 2016

M. Dacombe, A. T. Ashcroft
2018 Acta Crystallographica Section A: Foundations and Advances  
The report of the Executive Committee for 2016 is presented.  ...  The first such meeting was held in December 2015 in Pretoria, South Africa, with a focus on Big Data and Open Data.  ...  The 31st General Assembly of the International Council for Science was held in Auckland, New Zealand, 30 August -3 September 2014.  ... 
doi:10.1107/s2053273317009780 pmid:29724970 fatcat:pchaqu3bjvaejmnp5wh2f6crv4

Using Visual Challenges to Verify the Integrity of Security Cameras

Junia Valente, Alvaro A. Cárdenas
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
We propose a new way to verify the integrity and freshness of footage from security cameras by sending visual challenges to the area being monitored by the camera.  ...  Our implementation results show that visual challenges are an effective method to add defense-in-depth mechanisms to improve the trustworthiness of security cameras.  ...  This work was supported in part by NIST under award 70NANB14H236 from the U.S. Department of Commerce, and The Air Force Office of Scientific Research under award FA-9550-12-1-0077.  ... 
doi:10.1145/2818000.2818045 dblp:conf/acsac/ValenteC15 fatcat:4aszhvl3zzdcrgfoasr2leifxm

Evaluating the Flexibility of the Java Sandbox

Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
We describe an empirical study of the ways benign open-source Java applications use and interact with the Java security manager.  ...  We demonstrate that enforcing these rules at runtime stop a representative proportion of modern Java 7 exploits without breaking backwards compatibility with benign applications.  ...  ACSAC ' 15 , 15 December 07 -11, 2015, Los Angeles, CA, USA c 2015 Copyright held by the owner/author(s). Publication rights licensed to ACM.  ... 
doi:10.1145/2818000.2818003 dblp:conf/acsac/CokerMDGS15 fatcat:gmmzimr7hjf5jpqyttht2xipsa

Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks

Mariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
We describe the design, implementation, and evaluation of a security framework that achieves this.  ...  We also report on the overhead that the security adds in actual deployments on Android devices.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/2818000.2818001 dblp:conf/acsac/RaykovaLKG15 fatcat:i5nbyz7jgfbpdgkedg7duld36y

Getting to know your Card

Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
The commonly used RSA PKCS#11 standard defines the Application Programming Interface for cryptographic devices such as smart-cards.  ...  Though there has been work on formally verifying the correctness of the implementation of PKCS#11 in the API level, little attention has been paid to the low-level cryptographic protocols that implement  ...  ACSAC ' 15 , 15 December 07-11, 2015, Los Angeles, CA, USA c 2015 ACM.  ... 
doi:10.1145/2818000.2818020 dblp:conf/acsac/GkaniatsouMBSFB15 fatcat:s3ybzbtptndlreto3d5p5bda2e

Graph Neural Networks for Natural Language Processing: A Survey [article]

Lingfei Wu, Yu Chen, Kai Shen, Xiaojie Guo, Hanning Gao, Shucheng Li, Jian Pei, Bo Long
2021 arXiv   pre-print
We further introducea large number of NLP applications that are exploiting the power of GNNs and summarize thecorresponding benchmark datasets, evaluation metrics, and open-source codes.  ...  To the best of our knowledge, this is the first comprehensive overview of Graph NeuralNetworks for Natural Language Processing.  ...  Garnett, editors, Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pages 1171  ... 
arXiv:2106.06090v1 fatcat:zvkhinpcvzbmje4kjpwjs355qu

Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks

Song Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang
2015 Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015  
CAPTCHAs represent an important pillar in the web security domain. Yet, current CAPTCHAs do not fully meet the web security requirements.  ...  These CAPTCHAs are carefully built on the notions of dynamic cognitive games (DCG) and emerging images (EI), present in the literature.  ...  Acknowledgments The work has been partially supported by a grant from the National Science Foundation (CNS-1255919) and an award from COM-CAST.  ... 
doi:10.1145/2818000.2818006 dblp:conf/acsac/GaoMSZ15 fatcat:hz5pm7weljdphejde4yx2jlevi

Algorithmic Fairness Datasets: the Story so Far [article]

Alessandro Fabris, Stefano Messina, Gianmaria Silvello, Gian Antonio Susto
2022 arXiv   pre-print
As a result, a growing community of researchers has been investigating the equity of existing algorithms and proposing novel ones, advancing the understanding of risks and opportunities of automated decision-making  ...  We discuss different approaches and levels of attention to these topics, making them tangible, and distill them into a set of best practices for the curation of novel resources.  ...  Acknowledgements The authors would like to thank the following researchers and dataset creators for the useful feedback on the data briefs: Alain Barrat, Luc Behaghel, Asia Biega, Marko Bohanec, Chris  ... 
arXiv:2202.01711v3 fatcat:kd546yklwjhvtkrbhtzgbzb2xm

Pan American Health Organization (PAHO) Regional Office of the World Health Organization (WHO) [chapter]

2018 The Grants Register 2019  
The PDCA was established in 1884 by a group of contractors to devise a means for assuring the public of the skill, honorable reputation, and probity of master painters.  ...  Officer 5757 Wilshire Boulevard, Suite 370, Los Angeles, CA, 90036, United States of America Tel: (1) 323 933 1234 Fax: (1) 866 397 6468 Email: info@pointfoundation.org Website: www.pointfoundation.org  ...  Eligibility: Open to junior scholars who, at the time of application, have received a PhD (degree must be in hand no later than December of the year preceding the fellowship) but have not held it for more  ... 
doi:10.1007/978-1-349-95810-8_934 fatcat:dw6ts4hsevcmndhyvspiuteb7q

Principality of Liechtenstein State Educational Support [chapter]

2018 The Grants Register 2019  
The PDCA was established in 1884 by a group of contractors to devise a means for assuring the public of the skill, honorable reputation, and probity of master painters.  ...  Officer 5757 Wilshire Boulevard, Suite 370, Los Angeles, CA, 90036, United States of America Tel: (1) 323 933 1234 Fax: (1) 866 397 6468 Email: info@pointfoundation.org Website: www.pointfoundation.org  ...  Eligibility: Open to junior scholars who, at the time of application, have received a PhD (degree must be in hand no later than December of the year preceding the fellowship) but have not held it for more  ... 
doi:10.1007/978-1-349-95810-8_971 fatcat:2utzz7i2kjgp7igbuo5c7mp3ya

Painting and Decorating Contractors of America (PDCA) [chapter]

2018 The Grants Register 2019  
The PDCA was established in 1884 by a group of contractors to devise a means for assuring the public of the skill, honorable reputation, and probity of master painters.  ...  Officer 5757 Wilshire Boulevard, Suite 370, Los Angeles, CA, 90036, United States of America Tel: (1) 323 933 1234 Fax: (1) 866 397 6468 Email: info@pointfoundation.org Website: www.pointfoundation.org  ...  Eligibility: Open to junior scholars who, at the time of application, have received a PhD (degree must be in hand no later than December of the year preceding the fellowship) but have not held it for more  ... 
doi:10.1007/978-1-349-95810-8_932 fatcat:adnuikrdszexbiykx4dnz3njvm
« Previous Showing results 1 — 15 out of 66 results