Sciweavers

658 search results - page 60 / 132
» Open problems in the security of learning
Sort
View
PLDI
2009
ACM
14 years 1 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands
HICSS
2012
IEEE
293views Biometrics» more  HICSS 2012»
12 years 4 months ago
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters
—Security will be critical for the wireless interface offered by soon-to-be-ubiquitous smart meters — since if not secure, this technology will provide an remotely accessible a...
Travis Goodspeed, Sergey Bratus, Ricky Melgares, R...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
13 years 8 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
ICALT
2006
IEEE
14 years 3 months ago
Lifelong Competence Development: Towards a Common Metadata Model for Competencies Description - The Case Study of Europass Langu
Competence-based approaches in the field of formal or non-formal education and training are becoming more common and appear to offer the opportunity to develop programmes that mee...
Pythagoras Karampiperis, Demetrios G. Sampson, Dem...