Sciweavers

1564 search results - page 136 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
DLOG
2010
15 years 2 months ago
Correcting Access Restrictions to a Consequence
Recent research has shown that annotations are useful for representing access restrictions to the axioms of an ontology and their implicit consequences. Previous work focused on co...
Martin Knechtel, Rafael Peñaloza
TIP
2011
195views more  TIP 2011»
14 years 11 months ago
Accelerating X-Ray Data Collection Using Pyramid Beam Ray Casting Geometries
Abstract—Image reconstruction from its projections is a necessity in many applications such as medical (CT), security, inspection, and others. This paper extends the 2-D Fan-beam...
Amir Averbuch, Guy Lifschitz, Yoel Shkolnisky
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
14 years 11 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
TC
2010
14 years 11 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
14 years 8 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...