Sciweavers

920 search results - page 116 / 184
» Selecting Secure Passwords
Sort
View
OOPSLA
1990
Springer
14 years 1 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller
ACSAC
2001
IEEE
14 years 29 days ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
TC
2010
13 years 7 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
SPEECH
2011
13 years 4 months ago
Discrimination of speech from nonspeeech in broadcast news based on modulation frequency features
We describe a content based speech discrimination algorithm in broadcast news based on the time-varying information provided by the modulation spectrum. Due to the varying degrees...
Maria E. Markaki, Yannis Stylianou
EUROCRYPT
2011
Springer
13 years 24 days ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters