Sciweavers

2429 search results - page 284 / 486
» Using Aspects to Design a Secure System
Sort
View
EP
1998
Springer
15 years 7 months ago
Simplification of the Arabic Script: Three Different Approaches and their Implementations
Abstract. In 1945, the Cairo Academy for the Arabic Language opened a contest to find the best project for simplification of the Arabic writing system. They received about 200 repl...
Yannis Haralambous
IUI
2003
ACM
15 years 8 months ago
Intelligent dialog overcomes speech technology limitations: the SENECa example
We present a primarily speech-based user interface to a wide range of entertainment, navigation and communication applications for use in vehicles. The multimodal dialog enables t...
Wolfgang Minker, Udo Haiber, Paul Heisterkamp, Sve...
SIGCOMM
2004
ACM
15 years 8 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
SACMAT
2006
ACM
15 years 9 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
CCS
2010
ACM
15 years 3 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...