Sciweavers

298 search results - page 10 / 60
» Computer security: quality rather than quantity
Sort
View
ICPPW
2005
IEEE
15 years 7 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
ISI
2008
Springer
15 years 1 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
83
Voted
IJBC
2008
87views more  IJBC 2008»
15 years 1 months ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
CSFW
2008
IEEE
15 years 8 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
128
Voted
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 6 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...