Sciweavers

319 search results - page 29 / 64
» Controlled Secret Leakage
Sort
View
AMC
2005
116views more  AMC 2005»
13 years 7 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
RR
2010
Springer
13 years 6 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
TASLP
2010
115views more  TASLP 2010»
13 years 2 months ago
Integrated Active Noise Control and Noise Reduction in Hearing Aids
This paper presents a weighted approach for integrated active noise control and noise reduction in hearing aids. An integrated scheme has been introduced previously to tackle seco...
R. Serizel, Marc Moonen, Jan Wouters, Søren...
SOCC
2008
IEEE
106views Education» more  SOCC 2008»
14 years 2 months ago
A robust ultra-low power asynchronous FIFO memory with self-adaptive power control
First-in first-out (FIFO) memories are widely used in SoC for data buffering and flow control. In this paper, a robust ultra-low power asynchronous FIFO memory is proposed. With s...
Mu-Tien Chang, Po-Tsang Huang, Wei Hwang