Sciweavers

5476 search results - page 110 / 1096
» Resettably Secure Computation
Sort
View
IEEESP
2011
14 years 7 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
FTDCS
1997
IEEE
15 years 8 months ago
The Saga Security System: A Security Architecture for Open Distributed Systems
In the paper we present an overview of Saga Security System, a security architecture in open distributed systems. An agent in Saga Security System is called a Saga Agent. The auth...
Masakazu Soshi, Mamoru Maekawa
OOPSLA
2010
Springer
15 years 2 months ago
Programming with time: cyber-physical programming with impromptu
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Andrew Sorensen, Henry Gardner
177
Voted
SP
2010
IEEE
204views Security Privacy» more  SP 2010»
14 years 10 months ago
Acceleration of a CFD code with a GPU
The Computational Fluid Dynamics code Overflow includes as one of its solver options an algorithm which is a fairly small piece of code but which accounts for a significant portio...
Dennis C. Jespersen
IAJIT
2010
196views more  IAJIT 2010»
15 years 2 months ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima