Sciweavers

6555 search results - page 1071 / 1311
» Secure attribute-based systems
Sort
View
MATA
2000
Springer
15 years 7 months ago
YAAP: Yet Another Active Platform
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...
Nicolas Rouhana, Samer Boustany, Eric Horlait
AI
2010
Springer
15 years 7 months ago
Automatic Discovery of Network Applications: A Hybrid Approach
Automatic discovery of network applications is a very challenging task which has received a lot of attentions due to its importance in many areas such as network security, QoS prov...
Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. ...
132
Voted
NSDI
2008
15 years 6 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
WSC
2007
15 years 6 months ago
An elliptical cryptographic algorithm for RF wireless devices
In this paper, we propose a new asymmetric cryptographic algorithm (HOOD CRYPT) based on the Elliptical Curve Cryptographic approach. The algorithm describes how an orthogonal fre...
Robert Steven Owor, Khalil Dajani, Zephyrinus Okon...
AMAST
2008
Springer
15 years 5 months ago
Evolving Specification Engineering
Abstract. The motivation for this work is to support a natural separation of concerns during formal system development. In a developmentby-refinement context, we would like to be a...
Dusko Pavlovic, Peter Pepper, Douglas R. Smith
« Prev « First page 1071 / 1311 Last » Next »