Sciweavers

1627 search results - page 85 / 326
» High Security Smartcards
Sort
View
ESORICS
2004
Springer
15 years 9 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh
CSFW
2002
IEEE
15 years 9 months ago
Quantifying Information Flow
We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition of the capacity of covert channels. Ou...
Gavin Lowe
CHES
2001
Springer
59views Cryptology» more  CHES 2001»
15 years 8 months ago
Transparent Harddisk Encryption
This paper introduces a new block cipher, and discusses its security. Its design is optimized for high-bandwidth applications that do not have high requirements on key-schedule lat...
Thomas Pornin
AGENTS
2000
Springer
15 years 8 months ago
Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law
Highly believable anthropomorphic agents endanger electronic consumers. Because of concerning tendencies in human-agent interaction arising from agents’ anthropomorphic qualitie...
Carey Heckman, Jacob O. Wobbrock
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
15 years 2 months ago
State-of-the-art in heterogeneous computing
Node level heterogeneous architectures have become attractive during the last decade for several reasons: compared to traditional symmetric CPUs, they offer high peak performance a...
André Rigland Brodtkorb, Christopher Dyken,...