Sciweavers

4109 search results - page 666 / 822
» Issues in Design and Implementation of Multimedia Software S...
Sort
View
IJBC
2006
93views more  IJBC 2006»
15 years 4 months ago
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Gonzalo Álvarez, Shujun Li
105
Voted
CCS
2007
ACM
15 years 10 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
TABLETOP
2007
IEEE
15 years 10 months ago
Reading Revisited: Evaluating the Usability of Digital Display Surfaces for Active Reading Tasks
A number of studies have shown that paper holds several advantages over computers for reading tasks. However, these studies were carried out several years ago, and since that time...
Meredith Ringel Morris, A. J. Bernheim Brush, Bria...
129
Voted
CCS
2007
ACM
15 years 10 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros