Sciweavers

712 search results - page 110 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Pluggable AOP: designing aspect mechanisms for third-party composition
Studies of Aspect-Oriented Programming (AOP) usually focus on a language in which a specific aspect extension is integrated with a base language. Languages specified in this man...
Sergei Kojarski, David H. Lorenz
SAFECOMP
2005
Springer
15 years 3 months ago
Justification of Smart Sensors for Nuclear Applications
This paper describes the results of a research study sponsored by the UK nuclear industry into methods of justifying smart sensors. Smart sensors are increasingly being used in the...
Peter G. Bishop, Robin E. Bloomfield, Sofia Guerra...
TDSC
2010
168views more  TDSC 2010»
14 years 4 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
ACISP
2009
Springer
15 years 4 months ago
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
Abstract. In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the outer function FO of the KASUMI block cip...
Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui ...
CCS
2007
ACM
15 years 3 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth