Sciweavers

1131 search results - page 82 / 227
» Making Sense of Twitter
Sort
View
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 5 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
CBSE
2005
Springer
15 years 5 months ago
Tailored Responsibility Within Component-Based Systems
The concept of responsibility aims at making a computing system trustworthy for its users despite the fact that failures of IT systems cannot be completely excluded. The presented ...
Elke Franz, Ute Wappler
ERCIMDL
2005
Springer
82views Education» more  ERCIMDL 2005»
15 years 5 months ago
A Native XML Database Supporting Approximate Match Search
XML is becoming the standard representation format for metadata. Metadata for multimedia documents, as for instance MPEG-7, require approximate match search functionalities to be s...
Giuseppe Amato, Franca Debole
ISSEP
2005
Springer
90views Education» more  ISSEP 2005»
15 years 5 months ago
Preparatory Knowledge: Propaedeutic in Informatics
In the recent past a number of concepts have achieved prominence in the quest for basic principles of informatics with long-term validity. Particularly at schools providing an all-...
Susanne Loidl, Jörg R. Mühlbacher, Helmu...
MADNES
2005
Springer
15 years 5 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell