Sciweavers

6014 search results - page 1053 / 1203
» Structural Testing with Use Cases
Sort
View
IJNSEC
2008
106views more  IJNSEC 2008»
15 years 3 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
IS
2008
15 years 3 months ago
Integration of complex archeology digital libraries: An ETANA-DL experience
In this paper, we formalize the digital library (DL) integration problem and propose an overall approach based on the 5S (streams, structures, spaces, scenarios, and societies) fr...
Rao Shen, Naga Srinivas Vemuri, Weiguo Fan, Edward...
ENDM
2007
78views more  ENDM 2007»
15 years 3 months ago
The Interval Liar Game
We regard the problem of communication in the presence of faulty transmissions. In contrast to the classical works in this area, we assume some structure on the times when the faul...
Benjamin Doerr, Johannes Lengler, David Steurer
TSE
2008
107views more  TSE 2008»
15 years 3 months ago
Security Requirements Engineering: A Framework for Representation and Analysis
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requireme...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
JSW
2007
106views more  JSW 2007»
15 years 3 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
« Prev « First page 1053 / 1203 Last » Next »