Sciweavers

133 search results - page 27 / 27
» Future Trends in Secure Chip Data Management
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 6 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
14 years 21 days ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat
SOUPS
2006
ACM
14 years 6 days ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat