Sciweavers

324 search results - page 52 / 65
» Model Transformations in Practice Workshop
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 5 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 3 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ESWS
2008
Springer
15 years 1 months ago
Semantic Metadata Instantiation and Consolidation within an Ontology-based Multimedia Document Management System
Abstract. Automated modeling of appropriate and valid document descriptions is a central issue for the benefit and success of an ontologybased personal document management system. ...
Annett Mitschick, Ralf Nagel 0002, Klaus Meiß...
ESANN
2001
15 years 1 months ago
Motor control and movement optimization learned by combining auto-imitative and genetic algorithms
In sensorimotor behaviour often a great movement execution variability is combined with a relatively low error in reaching the intended goal. This phenomenon can especially be obse...
Karl-Theodor Kalveram, Ulrich Nakte
VIROLOGY
2008
121views more  VIROLOGY 2008»
14 years 11 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...