Sciweavers

16 search results - page 1 / 4
» tdsc 2008
Sort
View
TDSC
2008
82views more  TDSC 2008»
13 years 4 months ago
Generalized Ring Signatures
Jian Ren, Lein Harn
TDSC
2008
79views more  TDSC 2008»
13 years 4 months ago
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures
David Brumley, James Newsome, Dawn Song, Hao Wang,...
TDSC
2008
119views more  TDSC 2008»
13 years 4 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
TDSC
2008
116views more  TDSC 2008»
13 years 4 months ago
Practical Inference Control for Data Cubes
The fundamental problem for inference control in data cubes is how to efficiently calculate the lower and upper bounds for each cell value given the aggregations of cell values ove...
Haibing Lu, Yingjiu Li
TDSC
2010
102views more  TDSC 2010»
13 years 2 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia