Sciweavers

515 search results - page 30 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ISI
2008
Springer
14 years 12 months ago
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant ...
Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa...
IWSEC
2010
Springer
14 years 10 months ago
Security Metrics and Security Investment Models
Abstract. Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation ...
Rainer Böhme
TRUST
2010
Springer
14 years 10 months ago
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs ...
Heike Busch, Miroslava Sotáková, Ste...
CRITIS
2009
14 years 9 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
CCS
2011
ACM
13 years 12 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka