Sciweavers

8503 search results - page 1351 / 1701
» Secure Software Architectures
Sort
View
128
Voted
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 5 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
172
Voted
COLCOM
2008
IEEE
15 years 5 months ago
Mashup Model and Verification Using Mashup Processing Network
Abstract. Mashups are defined to be lightweight Web applications aggregating data from different Web services, built using ad-hoc composition and being not concerned with long term...
Ehtesham Zahoor, Olivier Perrin, Claude Godart
157
Voted
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 5 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
LREC
2010
154views Education» more  LREC 2010»
15 years 5 months ago
CCASH: A Web Application Framework for Efficient, Distributed Language Resource Development
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...
122
Voted
SERVICES
2008
85views more  SERVICES 2008»
15 years 5 months ago
Early Aspects for Non-Functional Properties in Service Oriented Business Processes
In Service Oriented Architecture, each application is often designed with a set of reusable services and a business process. In order to retain the reusability of services, it is ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
« Prev « First page 1351 / 1701 Last » Next »