Sciweavers

434 search results - page 48 / 87
» Security Documentation
Sort
View
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
14 years 1 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
CIKM
2005
Springer
14 years 1 months ago
Indexing time vs. query time: trade-offs in dynamic information retrieval systems
We examine issues in the design of fully dynamic information retrieval systems with support for instantaneous document insertions and deletions. We present one such system and dis...
Stefan Büttcher, Charles L. A. Clarke
CCS
2007
ACM
14 years 1 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
ISI
2007
Springer
14 years 1 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt
IH
1998
Springer
13 years 12 months ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender