Sciweavers

9730 search results - page 1692 / 1946
» Relating models of backtracking
Sort
View
CCS
2010
ACM
15 years 5 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
162
Voted
CMS
2010
207views Communications» more  CMS 2010»
15 years 5 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
144
Voted
CONCUR
2010
Springer
15 years 5 months ago
On the Compositionality of Round Abstraction
ompositionality of Round Abstraction Abstract Dan R. Ghica and Mohamed N. Menaa University of Birmingham, U.K. We revisit a technique called round abstraction as a solution to the ...
Dan R. Ghica, Mohamed N. Menaa
145
Voted
HPDC
2010
IEEE
15 years 5 months ago
Parallel processing of data from very large-scale wireless sensor networks
In this paper we explore the problems of storing and reasoning about data collected from very large-scale wireless sensor networks (WSNs). Potential worldwide deployment of WSNs f...
Christine Jardak, Janne Riihijärvi, Frank Old...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 5 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
« Prev « First page 1692 / 1946 Last » Next »