Sciweavers

1335 search results - page 105 / 267
» Privacy in Database Publishing
Sort
View
CCS
2008
ACM
15 years 6 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
ACISP
2010
Springer
15 years 5 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
ISICT
2003
15 years 5 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
OOPSLA
2010
Springer
15 years 2 months ago
Refactoring references for library migration
This report is a companion to the paper “Refactoring References for Library Migration” published at the ACM SIGPLAN International Conference on Systems, Programming, Languages...
Puneet Kapur, Bradley Cossette, Robert J. Walker
ADC
2005
Springer
111views Database» more  ADC 2005»
15 years 9 months ago
Redundancy, Dependencies and Normal Forms for XML Databases
With the advent of XML and its use as a database language, dependency and normal form theory has attracted novel research interest. Several approaches to build up a dependency and...
Klaus-Dieter Schewe