Sciweavers

130 search results - page 18 / 26
» The Semantics of Scheme Control-Flow Analysis
Sort
View
JCDL
2003
ACM
94views Education» more  JCDL 2003»
15 years 2 months ago
Content Access Characterization in Digital Libraries
To support non-trivial clients, such as data exploration and analysis environments, digital libraries must be able to describe the access modes that their contents support. We pre...
Greg Janee, James Frew, David Valentine
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
15 years 1 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
78
Voted
SOUPS
2006
ACM
15 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
SCP
2010
78views more  SCP 2010»
14 years 8 months ago
Scoping strategies for distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires a proper means for scoping aspects. Scoping issues are particularly crucial in a distri...
Éric Tanter, Johan Fabry, Rémi Douen...
98
Voted
IR
2006
14 years 9 months ago
A relatedness analysis of government regulations using domain knowledge and structural organization
The complexity and diversity of government regulations make understanding and retrieval of regulations a non-trivial task. One of the issues is the existence of multiple sources o...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold