Sciweavers

178 search results - page 29 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
ACSW
2004
15 years 3 months ago
A fuzzy ontology for medical document retrieval
Ontologies represent a method of formally expressing a shared understanding of information, and have been seen by many authors as a prerequisite for the "Semantic web". ...
David Parry
119
Voted
MONET
2010
148views more  MONET 2010»
15 years 1 days ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
ACSAC
2006
IEEE
15 years 7 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
IEEECIT
2010
IEEE
15 years 4 days ago
CFCSS without Aliasing for SPARC Architecture
With the increasing popularity of COTS (commercial off the shelf) components and multi-core processor in space and aviation applications, software fault tolerance becomes attracti...
Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, B...
BMCBI
2006
117views more  BMCBI 2006»
15 years 1 months ago
Analysis of gene expression changes in relation to toxicity and tumorigenesis in the livers of Big Blue transgenic rats fed comf
Background: Comfrey is consumed by humans as a vegetable and a tea, and has been used as an herbal medicine for more than 2000 years. Comfrey, however, is hepatotoxic in livestock...
Nan Mei, Lei Guo, Lu Zhang 0013, Leming M. Shi, Yo...