Sciweavers

298 search results - page 10 / 60
» Computer security: quality rather than quantity
Sort
View
ICPPW
2005
IEEE
14 years 3 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
ISI
2008
Springer
13 years 9 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
IJBC
2008
87views more  IJBC 2008»
13 years 9 months ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
CSFW
2008
IEEE
14 years 4 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
14 years 2 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...