Sciweavers

977 search results - page 87 / 196
» Soft Constraints for Security
Sort
View
ACSW
2006
15 years 3 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
CASCON
2006
149views Education» more  CASCON 2006»
15 years 3 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
127
Voted
CP
2011
Springer
14 years 1 months ago
Hierarchically Nested Convex VCSP
We introduce tractable classes of VCSP instances based on convex cost functions. Firstly, we show that the class of VCSP instances satisfying the hierarchically nested convexity pr...
Martin C. Cooper, Stanislav Zivny
109
Voted
SAFECOMP
1999
Springer
15 years 5 months ago
Towards Statistical Control of an Industrial Test Process
We present an ongoing experience aimed at introducing statistical process control techniques to one crucial test phase, namely Function Test, of a real world software development p...
Gaetano Lombardi, Emilia Peciola, Raffaela Mirando...
DAC
2008
ACM
15 years 3 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov