Power Contracts: Provably Complete Power Leakage Models for Processors
Abstract
References
Index Terms
- Power Contracts: Provably Complete Power Leakage Models for Processors
Recommendations
Collective Contracts for Message-Passing Parallel Programs
Computer Aided VerificationAbstractProcedure contracts are a well-known approach for specifying programs in a modular way. We investigate a new contract theory for collective procedures in parallel message-passing programs. As in the sequential setting, one can verify that a ...
Resilient uniformity: applying resiliency in masking
AbstractThreshold Implementations are known countermeasures defending against side-channel attacks via the use of masking techniques. While sufficient properties are known to defend against first-order side-channel attacks, it is not known how to achieve ...
Automated Negotiation of Privacy Contracts
COMPSAC '05: Proceedings of the 29th Annual International Computer Software and Applications Conference - Volume 01Privacy in the Internet is currently not addressed or just stated to tacit acceptance. The user is left to either accept or deny the contractual conditions. A negotiation and thus dynamic contract placement would allow for fairer chances concerning ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Heng Yin,
- Angelos Stavrou,
- Program Chairs:
- Cas Cremers,
- Elaine Shi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Austrian Research Promotion Agency (FFG)
- Federal Ministry of Education and Research (BMBF)
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 677Total Downloads
- Downloads (Last 12 months)335
- Downloads (Last 6 weeks)27
Other Metrics
Citations
Cited By
View allView Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in