Sciweavers

14824 search results - page 2653 / 2965
» Security - Introduction
Sort
View
133
Voted
FMLDO
1990
Springer
86views Database» more  FMLDO 1990»
15 years 7 months ago
Views in Object-Oriented Databases
Object-oriented database systems (ooDBMSs) are supposed to offer at least the functionality available in commercial relational DBMSs of today. One important consequence of this is...
Marc H. Scholl, Christian Laasch, Markus Tresch
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 7 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
107
Voted
ACNS
2007
Springer
96views Cryptology» more  ACNS 2007»
15 years 7 months ago
Universal Accumulators with Efficient Nonmembership Proofs
Based on the notion of accumulators, we propose a new cryptographic scheme called universal accumulators. This scheme enables one to commit to a set of values using a short accumul...
Jiangtao Li, Ninghui Li, Rui Xue
118
Voted
CAISE
2009
Springer
15 years 7 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
CAV
2009
Springer
239views Hardware» more  CAV 2009»
15 years 7 months ago
MCMAS: A Model Checker for the Verification of Multi-Agent Systems
tic modalities for correctness [16]. The release described in this abstract is a complete rebuild of a preliminary experimental checker [14]. The model input language includes vari...
Alessio Lomuscio, Hongyang Qu, Franco Raimondi
« Prev « First page 2653 / 2965 Last » Next »