Sciweavers

615 search results - page 56 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
89
Voted
TPDS
2008
262views more  TPDS 2008»
14 years 10 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
105
Voted
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
15 years 4 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
98
Voted
NAA
2000
Springer
131views Mathematics» more  NAA 2000»
15 years 2 months ago
Parallel Monte Carlo Methods for Derivative Security Pricing
Abstract. Monte Carlo (MC) methods have proved to be flexible, robust and very useful techniques in computational finance. Several studies have investigated ways to achieve greater...
Giorgio Pauletto
CCS
2010
ACM
15 years 2 months ago
RunTest: assuring integrity of dataflow processing in cloud computing infrastructures
Cloud computing has emerged as a multi-tenant resource sharing platform, which allows different service providers to deliver software as services in an economical way. However, fo...
Juan Du, Wei Wei, Xiaohui Gu, Ting Yu
90
Voted
IEEEARES
2006
IEEE
15 years 5 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner