Sciweavers

3452 search results - page 502 / 691
» Secure Data Outsourcing
Sort
View
134
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
159
Voted
FC
2000
Springer
150views Cryptology» more  FC 2000»
15 years 8 months ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
FPGA
2000
ACM
175views FPGA» more  FPGA 2000»
15 years 8 months ago
An FPGA implementation and performance evaluation of the Serpent block cipher
With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Encryption Standard (AES) development process is well underway. It is hoped that the result of the ...
Adam J. Elbirt, Christof Paar
OOPSLA
2000
Springer
15 years 8 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
140
Voted
SP
1991
IEEE
15 years 8 months ago
A Novel Decomposition of Multilevel Relations into Single-Level Relations
In this paper we give a new decomposition algorithm that breaks a multilevel relation into single-level relations and a new recovery algorithmwhich reconstructs the original multi...
Sushil Jajodia, Ravi S. Sandhu