Sciweavers

4270 search results - page 46 / 854
» A Permutation Approach to Validation
Sort
View
FIW
1998
104views Communications» more  FIW 1998»
15 years 1 months ago
Validating Architectural Feature Descriptions using LOTOS
The phases of the ANISE project (Architectural Notions In Service Engineering) are briefly explained with reference to the work reported here. An outline strategy is given for tra...
Kenneth J. Turner
95
Voted
ASIACRYPT
2011
Springer
13 years 11 months ago
Cryptanalysis of ARMADILLO2
ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper we propose a me...
Mohamed Ahmed Abdelraheem, Céline Blondeau,...
ISBI
2006
IEEE
16 years 15 days ago
Validation and regularization in diffusion MRI tractography
We present a physical phantom designed for fibre tractography validation and use it to evaluate tracking algorithms that employ (a) the classic diffusion tensor model of diffusion...
Jennifer S. W. Campbell, Peter Savadjiev, Kaleem S...
MOBISEC
2009
Springer
15 years 6 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
IEEEARES
2008
IEEE
15 years 6 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...