Sciweavers

1183 search results - page 140 / 237
» On flow-sensitive security types
Sort
View
ICDE
1993
IEEE
147views Database» more  ICDE 1993»
15 years 8 months ago
Large Object Support in POSTGRES
This paper presents four implementations for support of large objects in POSTGRES. The four implementations offer varying levels of support for security, transactions, compression...
Michael Stonebraker, Michael A. Olson
FPL
2006
Springer
127views Hardware» more  FPL 2006»
15 years 8 months ago
FPGA Vendor Agnostic True Random Number Generator
This paper describes a solution for the generation of true random numbers in a purely digital fashion; making it suitable for any FPGA type, because no FPGA vendor specific featur...
Dries Schellekens, Bart Preneel, Ingrid Verbauwhed...
ISSA
2008
15 years 5 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
15 years 4 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
CCS
2009
ACM
15 years 11 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...