Sciweavers

2486 search results - page 108 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ACRI
2004
Springer
14 years 2 months ago
A Novel Artificial Life Ecosystem Environment Model
This paper presents information flow model and a novel artificial life grid model to construct artificial life computer ecosystem environment. The life grid model is a three-dimens...
Zhengyou Xia, Yichuan Jiang
LCPC
2000
Springer
14 years 13 days ago
SmartApps: An Application Centric Approach to High Performance Computing
State-of-the-art run-time systems are a poor match to diverse, dynamic distributed applications because they are designed to provide support to a wide variety of applications, with...
Lawrence Rauchwerger, Nancy M. Amato, Josep Torrel...
CSFW
2010
IEEE
14 years 23 days ago
Required Information Release
Abstract—Many computer systems have a functional requirement to release information. Such requirements are an important part of a system’s information security requirements. Cu...
Stephen Chong
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 3 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon