Sciweavers

249 search results - page 39 / 50
» A secure scan design methodology
Sort
View
ECBS
1999
IEEE
138views Hardware» more  ECBS 1999»
13 years 12 months ago
Multi-Domain Surety Modeling and Analysis for High Assurance Systems
Engineering systems are becoming increasingly complex as state of the art technologies are incorporated into designs. Surety modeling and analysis is an emerging science which per...
James Davis, Jason Scott, Janos Sztipanovits, Marc...
OOPSLA
2007
Springer
14 years 1 months ago
A proposal for taming uncertainty in the collaborative conceptual model development process
There have been various proposals for the formalization of appropriate viewpoint-based frameworks. The model that we intend to devise attempts to provide a basis for conceptual mo...
Ebrahim Bagheri
EUROCRYPT
2003
Springer
14 years 23 days ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
SOUPS
2010
ACM
13 years 11 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
WWW
2004
ACM
14 years 8 months ago
Adapting databases and WebDAV protocol
The ability of the Web to share data regardless of geographical location raises a new issue called remote authoring. With the Internet and Web browsers being independent of hardwa...
Bita Shadgar, Ian Holyer