- Full text PDF available (3)
- This year (0)
- Last 5 years (1)
- Last 10 years (5)
Journals and Conferences
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of… (More)
For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution.… (More)
PURPOSE We completed a Phase I/II clinical trial (Lineberger Comprehensive Cancer Center 9603), in which we treated 62 Stage IIIA/IIIB inoperable non-small-cell lung cancer (NSCLC) patients with two cycles of induction carboplatin/paclitaxel chemotherapy, followed by concurrent weekly carboplatin/paclitaxel with radiation doses escalated from 60 to 74 Gy.… (More)
The clinical course and postmortem findings in a case of fatal traumatic dissecting aneurysm of the right middle cerebral artery in a 12-year-old boy are described. Possible mechanisms and predisposing causes leading to this injury are discussed, with reference to similar cases described in the literature.
We describe, and give experience with, a new method of intraprocedural data flow analysis on reducible flow-graphs. The method is advantageous in imbedded applications where the added value of improved performance justifies substantial optimization effort, but extremely powerful data flow analysis is required due to the code profile. The method is… (More)
Not long after the introduction of stored-program computing machines, the first high-level language compilers appeared. The need for automatically and efficiently mapping abstract concepts from high-level languages onto low-level assembly languages has been recognized ever since. A compiler has a unique ability to gather and analyze large amounts of data in… (More)
Worldwide deaths in police custody are causing public disquiet. An account is given of all the deaths occurring in police custody in England and Wales over a ten-year period from 1970-1979 with details of the causes of death and inquest verdicts.
Businesses often interact with users via web-browsers and applications on mobile devices, and host services on cloud servers they may not own. Such highly-exposed environments employ white-box cryptography (WBC) for security protection. WBC operates on a security model far different from the traditional black-box model. The modern business world includes… (More)