Sciweavers

1770 search results - page 202 / 354
» Writing requirements in computer security
Sort
View
IVC
2008
93views more  IVC 2008»
13 years 10 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
ISI
2007
Springer
13 years 10 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
PROVSEC
2010
Springer
13 years 8 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
IACR
2011
113views more  IACR 2011»
12 years 10 months ago
KISS: A Bit Too Simple
KISS (‘Keep it Simple Stupid’) is an efficient pseudo-random number generator originally specified by G. Marsaglia and A. Zaman in 1993. G. Marsaglia in 1998 posted a C versio...
Greg Rose
CADE
2000
Springer
14 years 3 months ago
Machine Instruction Syntax and Semantics in Higher Order Logic
Abstract. Proof-carrying code and other applications in computer security require machine-checkable proofs of properties of machine-language programs. These in turn require axioms ...
Neophytos G. Michael, Andrew W. Appel