Sciweavers

409 search results - page 36 / 82
» Flexible Scheduler-Independent Security
Sort
View
ACISP
2003
Springer
15 years 5 months ago
Grouping Verifiable Content for Selective Disclosure
Abstract. This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more ...
Laurence Bull, David McG. Squire, Jan Newmarch, Yu...
RIVF
2008
15 years 3 months ago
Quantum key distribution system using dual-threshold homodyne detection
In this work we present the principles of a flexible quantum key distribution (QKD) system using quadraturephase-shift-keying (QPSK) base and symbol encoding and dualthreshold bala...
Qing Xu 0006, Manuel Sabban, Philippe Gallion, Fra...
ISI
2006
Springer
15 years 1 months ago
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics
This paper aims to develop a new statistical measure to identify significant correlations among multiple events with spatial and temporal components. This new measure, ( , )K r t ,...
Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
JNW
2008
83views more  JNW 2008»
15 years 1 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
WETICE
2006
IEEE
15 years 8 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...