Sciweavers

416 search results - page 36 / 84
» Enough of Processes - Lets do Practices
Sort
View
CSFW
2008
IEEE
15 years 4 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
RAID
2007
Springer
15 years 3 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICAT
2003
IEEE
15 years 3 months ago
All in-Focus View Synthesis from Under-Sampled Light Fields
Light field rendering (LFR) is a fundamental method for generating new views from a set of pre-acquired images. We use densely-aligned cameras for the process of acquiring the se...
Keita Takahashi, Akira Kubota, Takeshi Naemura
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
SCS
2003
14 years 11 months ago
A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments
The development of safety critical systems is guided by standards. Many standards require the development of a safety case to demonstrate the acceptability of Safety Critical Syst...
Rob Weaver, Jane Fenn, Tim Kelly