Sciweavers

419 search results - page 73 / 84
» Succincter
Sort
View
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 3 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
95
Voted
CSFW
2007
IEEE
15 years 3 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
93
Voted
ISORC
2007
IEEE
15 years 3 months ago
A Comparative Evaluation of EJB Implementation Methods
As E-businesses are becoming ubiquitous, enhancing the performance and scalability of ebusiness systems has become an increasingly important topic of investigation. As Vitruvius (...
Andreas Stylianou, Giovanna Ferrari, Paul D. Ezhil...
PPDP
2007
Springer
15 years 3 months ago
Real-time rewriting semantics of orc
Orc is a language proposed by Jayadev Misra [19] for orchestration of distributed services. Orc is very simple and elegant, based on a few basic constructs, and allows succinct an...
Musab AlTurki, José Meseguer
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 3 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin