Sciweavers

17740 search results - page 3445 / 3548
» Simulation Using Orchestration
Sort
View
EUROCRYPT
2003
Springer
15 years 10 months ago
Resettable Zero-Knowledge in the Weak Public-Key Model
A new public-key model for resettable zero-knowledge (rZK) protocols, which is an extension and generalization of the upper-bounded public-key (UPK) model introduced by Micali and ...
Yunlei Zhao, Xiaotie Deng, Chan H. Lee, Hong Zhu
ICMI
2003
Springer
131views Biometrics» more  ICMI 2003»
15 years 10 months ago
TorqueBAR: an ungrounded haptic feedback device
Kinesthetic feedback is a key mechanism by which people perceive object properties during their daily tasks – particularly inertial properties. For example, transporting a glass...
Colin Swindells, Alex Unden, Tao Sang
ICS
2003
Tsinghua U.
15 years 10 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
ICSE
2003
IEEE-ACM
15 years 10 months ago
A Tutorial on Feature Oriented Programming and Product-Lines
ct Feature Oriented Programming (FOP) is a design methodology and tools for program synthesis. The goal is to specify a target program in terms of the features that it offers, and ...
Don S. Batory
IDEAL
2003
Springer
15 years 10 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
« Prev « First page 3445 / 3548 Last » Next »