Sciweavers

5475 search results - page 166 / 1095
» Model Driven Security
Sort
View
CASCON
2006
149views Education» more  CASCON 2006»
15 years 4 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
143
Voted
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 3 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
ACISP
2004
Springer
15 years 9 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
92
Voted
ICIP
2007
IEEE
16 years 5 months ago
Statistically Driven Sparse Image Approximation
Finding the sparsest approximation of an image as a sum of basis functions drawn from a redundant dictionary is an NPhard problem. In the case of a dictionary whose elements form ...
Rosa M. Figueras i Ventura, Eero P. Simoncelli
130
Voted
WISE
2009
Springer
15 years 10 months ago
Recommending Improvements to Web Applications Using Quality-Driven Heuristic Search
Planning out maintenance tasks to increase the quality of Web applications can be difficult for a manager. First, it is hard to evaluate the precise effect of a task on quality. S...
Stéphane Vaucher, Samuel Boclinville, Houar...