Sciweavers

406 search results - page 22 / 82
» PASSing the provenance challenge
Sort
View
PROVSEC
2009
Springer
15 years 4 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
78
Voted
SEMCO
2008
IEEE
15 years 4 months ago
Semantic Search Meets the Web
While semantic search technologies have been proven to work well in specific domains, they still have to confront two main challenges to scale up to the Web in its entirety. In th...
Miriam Fernández, Vanessa Lopez, Marta Sabo...
AGILEDC
2007
IEEE
15 years 4 months ago
Agility and the Inconceivably Large
This report outlines the experiences of the Microsoft Visual Studio Tools for Office product unit (hereafter referred to as “product unit”) as it applied agile principles and ...
Ade Miller, Eric Carter
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 4 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
TPHOL
2007
IEEE
15 years 3 months ago
Proof Pearl: The Power of Higher-Order Encodings in the Logical Framework LF
Abstract. In this proof pearl, we demonstrate the power of higherorder encodings in the logical framework Twelf[PS99] by investigating proofs about an algorithmic specification of...
Brigitte Pientka