Sciweavers

12052 search results - page 1983 / 2411
» computing 2010
Sort
View
ASM
2010
ASM
15 years 11 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
129
Voted
CCS
2010
ACM
15 years 11 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
CICLING
2010
Springer
15 years 11 months ago
Towards Automatic Detection and Tracking of Topic Change
We present an approach for automatic detection of topic change. Our approach is based on the analysis of statistical features of topics in time-sliced corpora and their dynamics ov...
Florian Holz, Sven Teresniak
182
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
« Prev « First page 1983 / 2411 Last » Next »