Sciweavers

262 search results - page 22 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
13 years 6 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
BTW
2005
Springer
80views Database» more  BTW 2005»
14 years 1 months ago
Measuring the Quality of Approximated Clusterings
Abstract. Clustering has become an increasingly important task in modern application domains. In many areas, e.g. when clustering complex objects, in distributed clustering, or whe...
Hans-Peter Kriegel, Martin Pfeifle
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
TKDE
2011
168views more  TKDE 2011»
13 years 3 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu