Sciweavers

574 search results - page 82 / 115
» Responsive Security for Stored Data
Sort
View
CF
2010
ACM
13 years 7 months ago
Efficient cache design for solid-state drives
Solid-State Drives (SSDs) are data storage devices that use solid-state memory to store persistent data. Flash memory is the de facto nonvolatile technology used in most SSDs. It ...
Miaoqing Huang, Olivier Serres, Vikram K. Narayana...
IJDE
2002
67views more  IJDE 2002»
13 years 7 months ago
Error, Uncertainty and Loss in Digital Evidence
Despite the potentially grave ramifications of relying on faulty information in the investigative or probabitive stages, the uncertainty in digital evidence is not being evaluated...
Eoghan Casey
KES
2010
Springer
13 years 6 months ago
Talking Biology in Logic, and Back
While computation of biological information takes center stage in today’s research, knowledge-based query processing in biological databases has not gained much attention. The co...
Hasan Jamil
ACMSE
2007
ACM
13 years 11 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
ISSTA
2012
ACM
11 years 10 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...