Sciweavers

2422 search results - page 441 / 485
» Security Policy Consistency
Sort
View
SRDS
2007
IEEE
15 years 11 months ago
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
Laurent Burgy, Laurent Réveillère, J...
128
Voted
ACCV
2007
Springer
15 years 10 months ago
Comparative Studies on Multispectral Palm Image Fusion for Biometrics
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi...
Ying Hao, Zhenan Sun, Tieniu Tan
125
Voted
ATC
2007
Springer
15 years 10 months ago
A Distributed Self-healing Data Store
Due to the huge amount of integrated devices and sensors in everyday objects ubiquitous systems are in vicinity and will be deployed in large scales in the near future. We expect t...
Wolfgang Trumler, Jörg Ehrig, Andreas Pietzow...
124
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Transactions with isolation and cooperation
We present the TIC (Transactions with Isolation and Cooperation) model for concurrent programming. TIC adds to standard transactional memory the ability for a transaction to obser...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 10 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki