Sciweavers

5722 search results - page 486 / 1145
» Security Function Interactions
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 9 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 8 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2006
98views more  BMCBI 2006»
15 years 4 months ago
Optimised amino acid specific weighting factors for unbound protein docking
Background: One of the most challenging aspects of protein-protein docking is the inclusion of flexibility into the docking procedure. We developed a postfilter where the grid-rep...
Philipp Heuser, Dietmar Schomburg
DAC
1999
ACM
16 years 5 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...