Sciweavers

6555 search results - page 1069 / 1311
» Secure attribute-based systems
Sort
View
117
Voted
COMPSAC
2009
IEEE
15 years 7 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
133
Voted
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 7 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
136
Voted
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 7 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
ICCS
2007
Springer
15 years 7 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
FPL
2004
Springer
143views Hardware» more  FPL 2004»
15 years 7 months ago
Exploring Area/Delay Tradeoffs in an AES FPGA Implementation
Abstract. Field-Programmable Gate Arrays (FPGAs) have lately become a popular target for implementing cryptographic block ciphers, as a well-designed FPGA solution can combine some...
Joseph Zambreno, David Nguyen, Alok N. Choudhary
« Prev « First page 1069 / 1311 Last » Next »