Sciweavers

1843 search results - page 253 / 369
» Securing Class Initialization
Sort
View
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 6 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
SACMAT
2005
ACM
15 years 6 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
93
Voted
SC
2005
ACM
15 years 6 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...
118
Voted
CHES
2005
Springer
281views Cryptology» more  CHES 2005»
15 years 6 months ago
Data Remanence in Flash Memory Devices
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
Sergei P. Skorobogatov
112
Voted
EUROCRYPT
2005
Springer
15 years 6 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu