Sciweavers

495 search results - page 68 / 99
» MASC - Monitoring and Security of Containers
Sort
View
USS
2008
15 years 3 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
BIOSURVEILLANCE
2008
Springer
15 years 3 months ago
Integrating a Commuting Model with the Bayesian Aerosol Release Detector
The Bayesian Aerosol Release Detector (BARD) is a biosurveillance system for detecting and characterizing disease outbreaks caused by aerosol releases of anthrax. A major challenge...
Aurel Cami, Garrick L. Wallstrom, William R. Hogan
ESAS
2006
Springer
15 years 3 months ago
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networ...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
PAISI
2010
Springer
15 years 3 months ago
Identifying Controversial Issues and Their Sub-topics in News Articles
We tackle the problem of automatically detecting controversial issues and their subtopics from news articles. We define a controversial issue as a concept that invokes conflicting ...
Yoonjung Choi, Yuchul Jung, Sung-Hyon Myaeng
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
15 years 2 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...