Sciweavers

722 search results - page 83 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 4 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
CODES
2007
IEEE
15 years 6 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 12 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CCS
2006
ACM
15 years 3 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
CORR
2007
Springer
98views Education» more  CORR 2007»
14 years 12 months ago
Enrichment of Qualitative Beliefs for Reasoning under Uncertainty
– This paper deals with enriched qualitative belief functions for reasoning under uncertainty and for combining information expressed in natural language through linguistic label...
Xinde Li, Xinhan Huang, Florentin Smarandache, Jea...