Sciweavers

185 search results - page 30 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
111
Voted
SEC
2008
15 years 2 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
85
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Throughput and Delay of DSL Dynamic Spectrum Management with Dynamic Arrivals
Abstract—In modern DSL networks, crosstalk among different lines (i.e., users) is the major source of performance degradation. Dynamic Spectrum Management (DSM) refers to a set o...
Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc M...
IS
2006
15 years 22 days ago
A methodology for clustering XML documents by structure
The processing and management of XML data are popular research issues. However, operations based on the structure of XML data have not received strong attention. These operations ...
Theodore Dalamagas, Tao Cheng, Klaas-Jan Winkel, T...
102
Voted
DS
1997
104views Database» more  DS 1997»
15 years 2 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
101
Voted
EUROCRYPT
2005
Springer
15 years 6 months ago
Smooth Projective Hashing and Two-Message Oblivious Transfer
We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup’s notion of smooth projective hashing (2002). ...
Yael Tauman Kalai