Sciweavers

3193 search results - page 104 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ER
1998
Springer
88views Database» more  ER 1998»
14 years 2 months ago
Numerical Aspects in the Data Model of Conceptual Information Systems
Abstract. While most data analysis and decision support tools use numerical aspects of the data, Conceptual Information Systems focus on their conceptual structure. This paper disc...
Gerd Stumme, Karl Erich Wolff
ICASSP
2011
IEEE
13 years 1 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 10 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
ASIACRYPT
2006
Springer
14 years 1 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
14 years 2 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...