Sciweavers

1275 search results - page 233 / 255
» time 1998
Sort
View
CCS
2003
ACM
14 years 1 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 1 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
HICSS
2002
IEEE
153views Biometrics» more  HICSS 2002»
14 years 1 months ago
Technology Supported Learning Applied to an Innovative, Integrated Curriculum for First-Year Engineering Majors
In September of 1998, the College of Engineering at the University of Massachusetts Dartmouth piloted an innovative, integrated, first-year curriculum. It dramatically changed 31 ...
Paul J. Fortier, Emily Fowler, Raymond N. Laoulach...
ECAI
2000
Springer
14 years 29 days ago
Flexible Text Classification for Financial Applications: The Facile System
This paper describes an advanced system for multilingual text classification adaptable to different user needs. The system has been initially developed as an applied research proje...
Fabio Ciravegna, Alberto Lavelli, Nadia Mana, Joha...
ACSAC
1998
IEEE
14 years 27 days ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer