Sciweavers

178 search results - page 29 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
ACSW
2004
15 years 1 months ago
A fuzzy ontology for medical document retrieval
Ontologies represent a method of formally expressing a shared understanding of information, and have been seen by many authors as a prerequisite for the "Semantic web". ...
David Parry
MONET
2010
148views more  MONET 2010»
14 years 10 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
ACSAC
2006
IEEE
15 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
IEEECIT
2010
IEEE
14 years 10 months ago
CFCSS without Aliasing for SPARC Architecture
With the increasing popularity of COTS (commercial off the shelf) components and multi-core processor in space and aviation applications, software fault tolerance becomes attracti...
Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, B...
BMCBI
2006
117views more  BMCBI 2006»
14 years 11 months ago
Analysis of gene expression changes in relation to toxicity and tumorigenesis in the livers of Big Blue transgenic rats fed comf
Background: Comfrey is consumed by humans as a vegetable and a tea, and has been used as an herbal medicine for more than 2000 years. Comfrey, however, is hepatotoxic in livestock...
Nan Mei, Lei Guo, Lu Zhang 0013, Leming M. Shi, Yo...