Sciweavers

2270 search results - page 13 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
14 years 2 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
TDSC
2010
102views more  TDSC 2010»
13 years 7 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia
CORR
2002
Springer
131views Education» more  CORR 2002»
13 years 8 months ago
A Connection-Centric Survey of Recommender Systems Research
Recommender systems attempt to reduce information overload and retain customers by selecting a subset of items from a universal set based on user preferences. While research in rec...
Saverio Perugini, Marcos André Gonça...
ICITS
2009
13 years 6 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
TSMC
2008
90views more  TSMC 2008»
13 years 8 months ago
Roles in Information Systems: A Survey
Role-based approaches are emerging technologies in information system design and implementation. Roles have been acknowledged and applied in many fields for many years. Considerin...
Haibin Zhu, MengChu Zhou