Sciweavers

1288 search results - page 210 / 258
» Securing aspect composition
Sort
View
IMC
2005
ACM
15 years 3 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
SOUPS
2005
ACM
15 years 3 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...
WPES
2005
ACM
15 years 3 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
62
Voted
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
15 years 3 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...
HICSS
2003
IEEE
141views Biometrics» more  HICSS 2003»
15 years 3 months ago
Understanding the Foundation of Mobile Content Quality A Presentation of a New Research Field
This paper studies some problems regarding mobile content quality (MCQ). Since the reason for communication is to be useful, we think that the only way of creating precise target ...
Pär Landor