Sciweavers

3544 search results - page 38 / 709
» Information Security in Open Systems
Sort
View
PST
2008
15 years 8 days ago
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support
In this paper we develop a security verification framework for open source software with a multi-language support. We base our approach on the GCC compiler which is considered as ...
Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Moura...
82
Voted
PAM
2010
Springer
15 years 24 days ago
OpenTM: Traffic Matrix Estimator for OpenFlow Networks
Abstract. In this paper we present OpenTM, a traffic matrix estimation system for OpenFlow networks. OpenTM uses built-in features provided in OpenFlow switches to directly and acc...
Amin Tootoonchian, Monia Ghobadi, Yashar Ganjali
ITICSE
1997
ACM
15 years 3 months ago
Computer managed, open question, open book assessment
This paper describes the development and use of practical examinations which include a significant element of software control of the administrative process. The educational metho...
John Rosbottom
81
Voted
HPDC
2005
IEEE
15 years 4 months ago
CODO: firewall traversal by cooperative on-demand opening
Firewalls and network address translators (NATs) cause significant connectivity problems along with benefits such as network protection and easy address planning. Connectivity pro...
Se-Chang Son, Bill Allcock, Miron Livny
EUROCRYPT
2004
Springer
15 years 4 months ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz