Sciweavers

556 search results - page 77 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
114
Voted
MSCS
2008
97views more  MSCS 2008»
15 years 1 months ago
Logical relations for monadic types
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In particular, programs c...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...
PATAT
2004
Springer
150views Education» more  PATAT 2004»
15 years 7 months ago
Logistics Service Network Design for Time-Critical Delivery
Abstract. Service network design is critical to the profitability of express shipment carriers. In this paper, we consider the problem of designing the integrated service network ...
Cynthia Barnhart, Su Shen
NSPW
2006
ACM
15 years 7 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
ICPR
2010
IEEE
15 years 25 days ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
IJISEC
2006
108views more  IJISEC 2006»
15 years 1 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt