Sciweavers

2108 search results - page 254 / 422
» Encrypted
Sort
View
ESSOS
2009
Springer
15 years 11 months ago
Idea: Trusted Emergency Management
Through first-responder access to sensitive information for which they have not been pre-vetted, lives and property can be saved. We describe enhancements to a trusted emergency i...
Timothy E. Levin, Cynthia E. Irvine, Terry Benzel,...
ICSE
2009
IEEE-ACM
15 years 11 months ago
Creating and evolving software by searching, selecting and synthesizing relevant source code
When programmers develop or maintain software, they instinctively sense that there are fragments of code that other developers implemented somewhere, and these code fragments coul...
Denys Poshyvanyk, Mark Grechanik
LATA
2009
Springer
15 years 11 months ago
A Cryptosystem Based on the Composition of Reversible Cellular Automata
We present conditions which guarantee that a composition of marker cellular automata has the same neighbourhood as each of the individual components. We show that, under certain te...
Adam Clarridge, Kai Salomaa
CCECE
2009
IEEE
15 years 11 months ago
An ultra compact block cipher for serialized architecture implementations
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
Cheng Wang, Howard M. Heys
CSE
2009
IEEE
15 years 11 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings