Ewha Womans University

Displaying 1-3 of 3 results

  • White Papers // May 2013

    Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing

    The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficulty of pairing inversion. In particular, they revisit the approach of Kanayama-Okamoto who modified exponentiation inversion and Miller inversion by considering an "Auxiliary"...

    Provided By Ewha Womans University

  • White Papers // Jun 2012

    Automated Memory Leakage Detection in Android Based Systems

    Since open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue...

    Provided By Ewha Womans University

  • White Papers // Aug 2008

    Storage Techniques for Heterogeneous Reference Type Data in an XML Schema

    An XML Schema is an XML-based alternative to DTDs which describes the structure of an XML document. Although various storage techniques that can reflect the XML schemas are actively being researched, new techniques need to be developed due to the fact that IDREFS type elements can refer to several different...

    Provided By Ewha Womans University

  • White Papers // May 2013

    Reducing Pairing Inversion to Exponentiation Inversion using Non-degenerate Auxiliary Pairing

    The security of pairing-based cryptosystems is closely related to the difficulty of the pairing inversion problem. Building on previous works, the authors provide further contributions on the difficulty of pairing inversion. In particular, they revisit the approach of Kanayama-Okamoto who modified exponentiation inversion and Miller inversion by considering an "Auxiliary"...

    Provided By Ewha Womans University

  • White Papers // Jun 2012

    Automated Memory Leakage Detection in Android Based Systems

    Since open platforms such as Android vary in device manufacturers and application developers, modifications in software happened in multiple layers. Therefore, every layer including OS, library, framework and application may have defects within. Especially, a memory leakage which increases memory usage and diminish overall system performance is the key issue...

    Provided By Ewha Womans University

  • White Papers // Aug 2008

    Storage Techniques for Heterogeneous Reference Type Data in an XML Schema

    An XML Schema is an XML-based alternative to DTDs which describes the structure of an XML document. Although various storage techniques that can reflect the XML schemas are actively being researched, new techniques need to be developed due to the fact that IDREFS type elements can refer to several different...

    Provided By Ewha Womans University