Sciweavers

2763 search results - page 43 / 553
» The Dangerous 'All' in Specifications
Sort
View
DSN
2008
IEEE
14 years 2 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
14 years 2 months ago
Kinematic study of the spider system in a biomimetic perspective
— The spiders’ ability of walking and climbing on different surfaces and in different conditions is taken into account in this paper in order to define and study a suitable sp...
Alessandro Gasparetto, Renato Vidoni, Tobias Seidl
OOPSLA
2007
Springer
14 years 2 months ago
Transactions with isolation and cooperation
We present the TIC (Transactions with Isolation and Cooperation) model for concurrent programming. TIC adds to standard transactional memory the ability for a transaction to obser...
Yannis Smaragdakis, Anthony Kay, Reimer Behrends, ...
VOTEID
2007
Springer
14 years 2 months ago
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulat...
Jens-Matthias Bohli, Jörn Müller-Quade, ...
EUROPKI
2004
Springer
14 years 1 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith