Sciweavers

110 search results - page 22 / 22
» A Process Algebra for Reasoning About Quantum Security
Sort
View
USS
2004
13 years 7 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
TOPLAS
2008
138views more  TOPLAS 2008»
13 years 6 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 6 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
SOICT
2010
13 years 29 days ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
SPEECH
2010
89views more  SPEECH 2010»
13 years 29 days ago
Which words are hard to recognize? Prosodic, lexical, and disfluency factors that increase speech recognition error rates
Despite years of speech recognition research, little is known about which words tend to be misrecognized and why. Previous work has shown that errors increase for infrequent words...
Sharon Goldwater, Daniel Jurafsky, Christopher D. ...