Sciweavers

324 search results - page 52 / 65
» Model Transformations in Practice Workshop
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 2 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 12 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ESWS
2008
Springer
13 years 10 months ago
Semantic Metadata Instantiation and Consolidation within an Ontology-based Multimedia Document Management System
Abstract. Automated modeling of appropriate and valid document descriptions is a central issue for the benefit and success of an ontologybased personal document management system. ...
Annett Mitschick, Ralf Nagel 0002, Klaus Meiß...
ESANN
2001
13 years 9 months ago
Motor control and movement optimization learned by combining auto-imitative and genetic algorithms
In sensorimotor behaviour often a great movement execution variability is combined with a relatively low error in reaching the intended goal. This phenomenon can especially be obse...
Karl-Theodor Kalveram, Ulrich Nakte
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 8 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...