Sciweavers

8587 search results - page 1374 / 1718
» Interactive dynamic abstraction
Sort
View
OTM
2007
Springer
15 years 10 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 10 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
REFSQ
2007
Springer
15 years 10 months ago
Optimal-Constraint Lexicons for Requirements Specifications
Abstract. Constrained Natural Languages (CNLs) are becoming an increasingly popular way of writing technical documents such as requirements specifications. This is because CNLs aim...
Stephen Boyd, Didar Zowghi, Vincenzo Gervasi
SAFECOMP
2007
Springer
15 years 10 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
« Prev « First page 1374 / 1718 Last » Next »