Sciweavers

5488 search results - page 1049 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
INDOCRYPT
2010
Springer
15 years 2 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
SOCIALCOM
2010
15 years 2 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
171
Voted
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
15 years 2 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
IJITN
2010
177views more  IJITN 2010»
15 years 1 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
176
Voted
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
« Prev « First page 1049 / 1098 Last » Next »