Sciweavers

5934 search results - page 1117 / 1187
» Detecting a Network Failure
Sort
View
WISTP
2010
Springer
16 years 11 days ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
CBMS
2009
IEEE
16 years 6 days ago
Enabling effective curation of cancer biomarker research data
The dramatic increase in data in the area of cancer research has elevated the importance of effectively managing the quality and consistency of research results from multiple prov...
Andrew F. Hart, Chris Mattmann, John J. Tran, Dani...
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
16 years 6 days ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
ESORICS
2009
Springer
16 years 5 days ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
ICALT
2009
IEEE
16 years 4 days ago
iCoper Best Practice Uses Cases and Standards for Learning Delivery
This conceptual paper outlines best practice use cases and standards for learning delivery that are the result of a European-wide best practice case study survey within the EU-fun...
Daniel Mueller, Volker Zimmermann
« Prev « First page 1117 / 1187 Last » Next »