Sciweavers

637 search results - page 112 / 128
» The Case for Abstracting Security Policies
Sort
View
92
Voted
SAFECOMP
1998
Springer
15 years 1 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
RAID
2004
Springer
15 years 2 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
CAISE
2009
Springer
15 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
PKC
2010
Springer
234views Cryptology» more  PKC 2010»
14 years 11 months ago
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Abstract. Pairings on elliptic curves over finite fields are crucial for constructing various cryptographic schemes. The T pairing on supersingular curves over GF(3n ) is particula...
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shi...
FS
2010
105views more  FS 2010»
14 years 8 months ago
Local time and the pricing of time-dependent barrier options
Abstract A time-dependent double-barrier option is a derivative security that delivers the terminal value φ(ST ) at expiry T if neither of the continuous time-dependent barriers b...
Aleksandar Mijatovic