1 resultado para Secure Actions, Homomorphic Encryption, Electronic Commerce
em Duke University
Filtro por publicador
- Repository Napier (3)
- Abertay Research Collections - Abertay University’s repository (1)
- Aberystwyth University Repository - Reino Unido (1)
- Academic Archive On-line (Stockholm University; Sweden) (1)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (2)
- Andina Digital - Repositorio UASB-Digital - Universidade Andina Simón Bolívar (1)
- Archive of European Integration (8)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (4)
- Aston University Research Archive (20)
- Biblioteca de Teses e Dissertações da USP (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (3)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (1)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (1)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (7)
- Brock University, Canada (3)
- CaltechTHESIS (1)
- Cambridge University Engineering Department Publications Database (1)
- CentAUR: Central Archive University of Reading - UK (5)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (4)
- Cochin University of Science & Technology (CUSAT), India (2)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (9)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Corvinus Research Archive - The institutional repository for the Corvinus University of Budapest (1)
- Dalarna University College Electronic Archive (1)
- Department of Computer Science E-Repository - King's College London, Strand, London (2)
- Digital Commons - Michigan Tech (2)
- Digital Commons at Florida International University (7)
- Digital Peer Publishing (4)
- DigitalCommons@The Texas Medical Center (2)
- Duke University (1)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (1)
- Glasgow Theses Service (1)
- Greenwich Academic Literature Archive - UK (1)
- Illinois Digital Environment for Access to Learning and Scholarship Repository (1)
- Indian Institute of Science - Bangalore - Índia (20)
- Instituto Politécnico do Porto, Portugal (4)
- Memorial University Research Repository (1)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (2)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (22)
- Queensland University of Technology - ePrints Archive (432)
- RDBU - Repositório Digital da Biblioteca da Unisinos (1)
- Repositório Científico do Instituto Politécnico de Lisboa - Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (17)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositório Institucional da Universidade Federal do Rio Grande - FURG (1)
- Repositório Institucional da Universidade Federal do Rio Grande do Norte (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (16)
- Repositorio Institucional Universidad EAFIT - Medelin - Colombia (2)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (2)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- South Carolina State Documents Depository (1)
- Universidad de Alicante (4)
- Universidad del Rosario, Colombia (17)
- Universidad Politécnica de Madrid (14)
- Universidade Federal do Pará (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (3)
- Universidade Metodista de São Paulo (1)
- Universitat de Girona, Spain (4)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (2)
- Université de Lausanne, Switzerland (1)
- Université de Montréal (7)
- Université de Montréal, Canada (67)
- University of Michigan (24)
- University of Queensland eSpace - Australia (18)
- WestminsterResearch - UK (1)
Resumo:
Encryption and integrity trees guard against phys- ical attacks, but harm performance. Prior academic work has speculated around the latency of integrity verification, but has done so in an insecure manner. No industrial implementations of secure processors have included speculation. This work presents PoisonIvy, a mechanism which speculatively uses data before its integrity has been verified while preserving security and closing address-based side-channels. PoisonIvy reduces per- formance overheads from 40% to 20% for memory intensive workloads and down to 1.8%, on average.