Sciweavers

6574 search results - page 38 / 1315
» Current Signatures: Application
Sort
View
CCS
2009
ACM
14 years 11 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
KBSE
2003
IEEE
14 years 3 months ago
The Feature Signatures of Evolving Programs
As programs evolve, their code increasingly becomes tangled by programmers and requirements. This mosaic quality complicates program comprehension and maintenance. Many of these a...
Daniel R. Licata, Christopher D. Harris, Shriram K...
CISC
2009
Springer
171views Cryptology» more  CISC 2009»
13 years 8 months ago
Sanitizable Signatures with Strong Transparency in the Standard Model
Sanitizable signatures provide several security features which are useful in many scenarios including military and medical applications. Sanitizable signatures allow a semi-trusted...
Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. P...
BIB
2006
169views more  BIB 2006»
13 years 10 months ago
Bio-ontologies: current trends and future directions
: In recent years, as a knowledge-based discipline, bioinformatics has moved to make its knowledge more computationally amenable. After its beginnings in the disciplines as a techn...
Olivier Bodenreider, Robert Stevens
CCR
2000
101views more  CCR 2000»
13 years 10 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song