Sciweavers

286 search results - page 17 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
DAWAK
2006
Springer
13 years 11 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
KSEM
2007
Springer
14 years 1 months ago
Knowledge Engineering Technique for Cluster Development
After the concept of industry cluster was tangibly applied in many countries, SMEs trended to link to each other to maintain their competitiveness in the market. The major key succ...
Pradorn Sureephong, Nopasit Chakpitak, Yacine Ouzr...
RE
1999
Springer
13 years 12 months ago
An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering
Multiple viewpoints are often used in Requirements Engineering to facilitate traceability to stakeholders, to structure the requirements process, and to provide richer modelling b...
Tim Menzies, Steve M. Easterbrook, Bashar Nuseibeh...
WWW
2008
ACM
14 years 8 months ago
Genealogical trees on the web: a search engine user perspective
This paper presents an extensive study about the evolution of textual content on the Web, which shows how some new pages are created from scratch while others are created using al...
Ricardo A. Baeza-Yates, Álvaro R. Pereira J...
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay