Sciweavers

5722 search results - page 249 / 1145
» Security Function Interactions
Sort
View
ICANN
2010
Springer
15 years 1 months ago
Dynamics and Function of a CA1 Model of the Hippocampus during Theta and Ripples
The hippocampus is known to be involved in spatial learning in rats. Spatial learning involves the encoding and replay of temporally sequenced spatial information. Temporally seque...
Vassilis Cutsuridis, Michael E. Hasselmo
COMPSAC
2006
IEEE
15 years 9 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
ITCC
2005
IEEE
15 years 8 months ago
An Aspect-Oriented Approach to Mobile Agent Access Control
This paper presents an aspect-oriented approach to access control in mobile agent systems, where a multipoint security check mechanism visualizes the services of a host as individ...
Dianxiang Xu, Vivek Goel
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 3 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi