Sciweavers

3420 search results - page 206 / 684
» A Language-Based Approach to Security
Sort
View
116
Voted
IEEEARES
2006
IEEE
15 years 10 months ago
Defining Criteria for Rating an Entity's Trustworthiness Based on Its Certificate Policy
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...
Omar Batarfi, Lindsay Marshall
NDSS
1998
IEEE
15 years 8 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
15 years 8 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
IEEESP
2007
98views more  IEEESP 2007»
15 years 4 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
133
Voted
ICASSP
2008
IEEE
15 years 11 months ago
A covariance kernel for SVM language recognition
Discriminative training for language recognition has been a key tool for improving system performance. In addition, recognition directly from shifted-delta cepstral features has p...
William M. Campbell