Sciweavers

2429 search results - page 253 / 486
» Using Aspects to Design a Secure System
Sort
View
PAMI
2010
168views more  PAMI 2010»
15 years 1 months ago
The Multiscenario Multienvironment BioSecure Multimodal Database (BMDB)
—A new multimodal biometric database designed and acquired within the framework of the European BioSecure Network of Excellence is presented. It is comprised of more than 600 ind...
Javier Ortega-Garcia, Julian Fiérrez, Ferna...
CCS
2010
ACM
15 years 2 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
IMC
2006
ACM
15 years 9 months ago
Comprehensive view of a live network coding P2P system
In this paper we present the first implementation of a P2P content distribution system that uses Network Coding. Using results from live trials with several hundred nodes, we pro...
Christos Gkantsidis, John Miller, Pablo Rodriguez
IFIP13
2004
15 years 4 months ago
Analysing Dynamic Function Scheduling Decisions
: Function allocation, as a process used in the construction of dependable complex systems, is a significant aspect of the design and implementation of interactive systems. It invo...
Karsten Loer, Michael Hildebrandt, Michael D. Harr...
118
Voted
CSFW
2006
IEEE
15 years 9 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi