Sciweavers

741 search results - page 106 / 149
» Abstract Machines for Communication Security
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
DIM
2007
ACM
14 years 1 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
14 years 1 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 8 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
COMPUTER
2004
105views more  COMPUTER 2004»
13 years 10 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...