Sciweavers

981 search results - page 34 / 197
» Advanced Encryption Standard
Sort
View
GPCE
2009
Springer
14 years 3 months ago
Advanced runtime adaptation for Java
Dynamic aspect-oriented programming (AOP) enables runtime adaptation of aspects, which is important for building sophisticated, aspect-based software engineering tools, such as ad...
Alex Villazón, Walter Binder, Danilo Ansalo...
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 3 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CEC
2010
IEEE
14 years 2 days ago
An analysis of clustering objectives for feature selection applied to encrypted traffic identification
This work explores the use of clustering objectives in a Multi-Objective Genetic Algorithm (MOGA) for both, feature selection and cluster count optimization, under the application...
Carlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. ...
ACNS
2008
Springer
252views Cryptology» more  ACNS 2008»
14 years 5 months ago
Generic Constructions of Stateful Public Key Encryption and Their Applications
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new ...
Joonsang Baek, Jianying Zhou, Feng Bao
IJSWIS
2008
100views more  IJSWIS 2008»
13 years 11 months ago
Semantic-Based Bluetooth-RFID Interaction for Advanced Resource Discovery in Pervasive Contexts
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and illustrated in an innovative u-comme...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....