Sciweavers

298 search results - page 29 / 60
» Computer security: quality rather than quantity
Sort
View
NSPW
2006
ACM
14 years 3 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
APCSAC
2004
IEEE
14 years 1 months ago
Validating Word-Oriented Processors for Bit and Multi-word Operations
We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by diffe...
Ruby B. Lee, Xiao Yang, Zhijie Shi
ICTCS
2007
Springer
14 years 4 months ago
Analyzing Non-Interference with respect to Classes
The information flow property of Non-Interference was recently relaxed into Abstract NonInterference (ANI), a weakened version where attackers can only observe properties of data,...
Damiano Zanardini
DIS
2001
Springer
14 years 2 months ago
Theory Revision in Equation Discovery
Abstract. State of the art equation discovery systems start the discovery process from scratch, rather than from an initial hypothesis in the space of equations. On the other hand,...
Ljupco Todorovski, Saso Dzeroski
TCSV
2010
13 years 4 months ago
Application-Centric Routing for Video Streaming Over MultiHop Wireless Networks
Abstract--Most existing works on routing for video transmission over multihop wireless networks only focus on how to satisfy the network-oriented quality-of-service (QoS), such as ...
Dalei Wu, Song Ci, Haohong Wang, Aggelos K. Katsag...