Sciweavers

1286 search results - page 151 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
EUROCRYPT
2003
Springer
15 years 6 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
114
Voted
PAMI
2008
145views more  PAMI 2008»
15 years 19 days ago
Latent-Space Variational Bayes
Variational Bayesian Expectation-Maximization (VBEM), an approximate inference method for probabilistic models based on factorizing over latent variables and model parameters, has ...
JaeMo Sung, Zoubin Ghahramani, Sung Yang Bang
101
Voted
CCS
2004
ACM
15 years 6 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
99
Voted
AINA
2009
IEEE
15 years 5 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
EDOC
2003
IEEE
15 years 6 months ago
An Approach to Relate Viewpoints and Modeling Languages
The architectural design of distributed enterprise applications from the viewpoints of different stakeholders has been proposed for some time, for example, as part of RM-ODP and I...
Remco M. Dijkman, Dick A. C. Quartel, Luís ...