Sciweavers

519 search results - page 22 / 104
» How to make secure email easier to use
Sort
View
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 4 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
IJNSEC
2007
156views more  IJNSEC 2007»
14 years 9 months ago
Another Look at PMAC
We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than...
Dayin Wang, Dongdai Lin, Wenling Wu
ASAP
2007
IEEE
93views Hardware» more  ASAP 2007»
15 years 4 months ago
LNS Subtraction Using Novel Cotransformation and/or Interpolation
The Logarithmic Number System (LNS) makes multiplication, division and powering easy, but subtraction is expensive. Cotransformation converts the difficult operation of logarithm...
Panagiotis D. Vouzis, Sylvain Collange, Mark G. Ar...
RULEML
2009
Springer
15 years 4 months ago
Process Materialization Using Templates and Rules to Design Flexible Process Models
The main idea in this paper is to show how flexible processes can be designed by combining generic process templates and business rules. We instantiate a process by applying rules ...
Akhil Kumar, Wen Yao
EUROMICRO
2000
IEEE
15 years 2 months ago
Behavioral Specification of a Circuit Using SyncCharts: A Case Study
In this paper we propose a high-level description of the behavior of digital systems. Behaviors are specified with a graphical synchronous model: “SyncCharts”. SyncCharts supp...
Charles André, Marie-Agnès Peraldi-F...