Sciweavers

1186 search results - page 124 / 238
» A New Approach to Secure Logging
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
15 years 2 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
CCS
2007
ACM
15 years 6 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
WSE
2002
IEEE
15 years 5 months ago
Understanding Web Usage for Dynamic Web-Site Adaptation: A Case Study
Every day, new information, products and services are being offered by providers on the World Wide Web. At the same time, the number of consumers and the diversity of their intere...
Nan Niu, Eleni Stroulia, Mohammad El-Ramly
107
Voted
CCCG
2010
15 years 2 months ago
An optimal solution for dynamic polar diagram
The Polar Diagram [1] of a set of points (i.e. sites) is a partition of the plane. It is a locus approach for problems processing angles. Also, Dynamic Polar Diagram problem is a ...
Ebrahim Ehsanfar, Bahram Sadeghi Bigham, Najmeh Ma...
109
Voted
DSS
2008
130views more  DSS 2008»
15 years 23 days ago
Knowledge representation concepts for automated SLA management
Outsourcing of complex IT infrastructure to IT service providers has increased substantially during the past years. IT service providers must be able to fulfil their service-qualit...
Adrian Paschke, Martin Bichler