Sciweavers

2178 search results - page 127 / 436
» Toward Systemically Secure IT Architectures
Sort
View
EUROSEC
2010
ACM
14 years 4 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
BCS
2008
13 years 10 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
CIDR
2003
121views Algorithms» more  CIDR 2003»
13 years 10 months ago
Towards High Performance Peer-to-Peer Content and Resource Sharing Systems
Peer-to-peer sharing systems are becoming increasingly popular and an exciting new class of innovative, internet-based data management systems. In these systems, users contribute ...
Peter Triantafillou, Chryssani Xiruhaki, Manolis K...
ISI
2008
Springer
13 years 9 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
ISCAS
2007
IEEE
141views Hardware» more  ISCAS 2007»
14 years 3 months ago
Towards a GBit/s Programmable Decoder for LDPC Convolutional Codes
Abstract— We analyze the decoding algorithm for regular timeinvariant LDPC convolutional codes as a 3D signal processing scheme and derive several parallelization concepts, which...
Emil Matús, Marcos B. S. Tavares, Marcel Bi...