Sciweavers

14824 search results - page 2773 / 2965
» Security - Introduction
Sort
View
135
Voted
CJ
2010
150views more  CJ 2010»
15 years 2 days ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
106
Voted
CLEIEJ
2010
15 years 2 days ago
Design, Implementation and Use of a Remote Network Lab with Multiple Users Support as an Aid Teaching Computer Networks
This article presents the design, implementation and use of a remote network lab with multiple users support as an aid to teaching computer networks. The purpose is to enable mult...
Marco Aravena Vivar, Cristian Rodriguez, Andres Ra...
126
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 1 days ago
Personalized Data Set for Analysis
Data Management portfolio within an organization has seen an upsurge in initiatives for compliance, security, repurposing and storage within and outside the organization. When suc...
Vishal Gupta, Ashutosh Saxena
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 12 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
139
Voted
IJISEC
2010
159views more  IJISEC 2010»
14 years 12 months ago
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme e...
Ivan Damgård, Mads Jurik, Jesper Buus Nielse...
« Prev « First page 2773 / 2965 Last » Next »