Sciweavers

1527 search results - page 220 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 9 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
14 years 3 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
DASFAA
2007
IEEE
183views Database» more  DASFAA 2007»
14 years 3 months ago
BioDIFF: An Effective Fast Change Detection Algorithm for Biological Annotations
Abstract. Warehousing heterogeneous, dynamic biological data is a key technique for biological data integration as it greatly improves performance. However, it requires complex mai...
Yang Song, Sourav S. Bhowmick, C. Forbes Dewey
INDOCRYPT
2005
Springer
14 years 2 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
ATAL
2007
Springer
13 years 11 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh