Sciweavers

5722 search results - page 197 / 1145
» Security Function Interactions
Sort
View
VC
2010
212views more  VC 2010»
14 years 7 months ago
Interactive evolutionary 3D fractal modeling
In this research we present a technique for the automatic generation of 3D art form, which allows designers to get access to large number of 3D shapes that can be altered interact...
Wenjun Pang, K. C. Hui
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 2 months ago
TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management
: Federated Single-Sign-On using web browsers as User Agents becomes increasingly important. However, current proposals require substantial changes in the implementation of the Rel...
Bud P. Bruegger, Detlef Hühnlein, Jörg S...
IEEEARES
2009
IEEE
14 years 10 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark
92
Voted
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 7 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
CGO
2003
IEEE
15 years 6 months ago
Hiding Program Slices for Software Security
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...
Xiangyu Zhang, Rajiv Gupta