|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Maithili Narasimha, Gene Tsudik |
DSAC: integrity for outsourced databases with signature aggregation and chaining. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing |
25 | Ajoy Kumar Palit, Lei Wu, Kishore K. Duganapalli, Walter Anheier, Jürgen Schlöffel |
A New, Flexible and Very Accurate Crosstalk Fault Model to Analyze the Effects of Coupling Noise between the Interconnects on Signal Integrity Losses in Deep Submicron Chips. |
Asian Test Symposium |
2005 |
DBLP DOI BibTeX RDF |
crosstalk model, aggressor-victim, ABCD-model, crosstalk-hazards, signal integrity |
25 | Mohammad Banikazemi, Dan E. Poff, Bülent Abali |
Storage-based file system integrity checker. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
file system integrity check, storage-based intrusion detection |
25 | Subhasish Mazumdar, Panos K. Chrysanthis |
Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. |
Mob. Networks Appl. |
2004 |
DBLP DOI BibTeX RDF |
caching and replication, transaction processing, integrity constraints, mobile databases, data consistency, disconnected operations |
25 | Frances M. T. Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens, Niek J. E. Wijngaards |
Law-abiding and integrity on the Internet: A case for agents. |
Artif. Intell. Law |
2004 |
DBLP DOI BibTeX RDF |
agent migration, integrity, software agents, legal aspects, agent platforms, liability |
25 | Jennifer Sampson, Clare Atkins |
Semantic Integrity in Data Warehousing: A Framework for Understanding. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Data modelling, Data warehousing, Semantic integrity |
25 | Axelle Apvrille, James P. Hughes 0001, Vincent Girier |
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
XML, INTEGRITY, DIGITAL SIGNATURE, STORAGE, WORM, TIME STAMP |
25 | Colin D. Walter |
Data Integrity in Hardware for Modular Arithmetic. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation |
25 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
25 | Martin Gogolla |
Algebraization and Integrity Constraints for an Extended Entity-Relationship Approach. |
TAPSOFT, Vol.1 |
1989 |
DBLP DOI BibTeX RDF |
Theory of data bases, relational completeness, data model, abstract data type, formal semantics, integrity constraint, entity-relationship model, calculus, aggregate function |
24 | Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff |
Considerations Towards a Cyber Crime Profiling System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. |
MICRO |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Houben, Djamal Benslimane |
Wrapper-based evolution of legacy information systems. |
ACM Trans. Softw. Eng. Methodol. |
2006 |
DBLP DOI BibTeX RDF |
legacy database, evolution, CASE tool, wrapper, data consistency, Schema transformation, data reverse-engineering |
24 | Kun Bai, Alex Hai Wang, Peng Liu 0005 |
Towards Database Firewalls. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
24 | K. W. Ko, I. T. Kim, Sang Bong Yoo, Ki-Chang Kim, Soo Duk Kim, J. S. Kim, Yong Surk Lee |
Compiling Rule-Based Agent for Distributed Databases. |
IICS |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Parke Godfrey, Jarek Gryz, Calisto Zuzarte |
Exploiting Constraint-Like Data Characterizations in Query Optimization. |
SIGMOD Conference |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gelareh Taban, Virgil D. Gligor |
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers |
24 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. |
HPCA |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Hendrik Decker |
Extending Inconsistency-Tolerant Integrity Checking by Semantic Query Optimization. |
DEXA |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wenbing Zhao 0001 |
Integrity-Preserving Replica Coordination for Byzantine Fault Tolerant Systems. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin 0001 |
High-Assurance Integrity Techniques for Databases. |
BNCOD |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Luciano Caroprese, Miroslaw Truszczynski |
Declarative Semantics for Revision Programming and Connections to Active Integrity Constraints. |
JELIA |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mário de Sousa |
Restricting IEC 61131-3 programming languages for use on high integrity applications. |
ETFA |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jun Chen 0008, Lei He 0001 |
Efficient In-Package Decoupling Capacitor Optimization for I/O Power Integrity. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yunsi Fei, Zhijie Jerry Shi |
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Mehrdad Salehi, Yvan Bédard, Mir Abolfazl Mostafavi, Jean Brodeur |
On Languages for the Specification of Integrity Constraints in Spatial Conceptual Models. |
ER Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai |
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ege Engin, Krishna Bharath, Madhavan Swaminathan |
Analysis for Signal and Power Integrity Using the Multilayered Finite Difference Method. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ninghui Li, Ziqing Mao, Hong Chen |
Usable Mandatory Integrity Protection for Operating Systems. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Somesh Jha, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith, Stephen Chenney |
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart |
Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hendrik Decker |
An Integrity Semantics for Open World Databases. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hao Yu 0001, Joanna Ho, Lei He 0001 |
Simultaneous power and thermal integrity driven via stapling in 3D ICs. |
ICCAD |
2006 |
DBLP DOI BibTeX RDF |
structured and parameterized model order reduction, thermal modeling and management |
24 | Ho-Jun Na, Deok-Hyun Yoon, Chang Soo Kim, Hyun-Suk Hwang |
Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Davide Martinenghi, Henning Christiansen 0001 |
Efficient Integrity Checking for Databases with Recursive Views. |
ADBIS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Kil-Sang Yoo, Mi-Ae Kim, Won-Hyung Lee |
Invertible Watermarking Scheme for Authentication and Integrity. |
PCM (2) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Rodrigo Almeida dos Santos, Mario Fiallos Aguilar, Paulo Benicio Melo de Sousa, Joao C. Sousa, Rossana M. C. Andrade |
Anti-Doping: An Approach for Grid Integrity Verification. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad H. Tehranipour, Nisar Ahmed, Mehrdad Nourani |
Testing SoC interconnects for signal integrity using extended JTAG architecture. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jordi Cabot, Ernest Teniente |
Determining the Structural Events That May Violate an Integrity Constraint. |
UML |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jinjun Xiong, Lei He 0001 |
Full-Chip Multilevel Routing for Power and Signal Integrity. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Atsushi Kurokawa, Nobuto Ono, Tetsuro Kage, Hiroo Masuda |
DEPOGIT: dense power-ground interconnect architecture for physical design integrity. |
ASP-DAC |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Johan Muskens, Michel R. V. Chaudron |
Integrity Management in Component Based Systems. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Tiehan Lv, Jörg Henkel, Haris Lekatsas, Wayne H. Wolf |
Enhancing Signal Integrity through a Low-Overhead Encoding Scheme on Address Buses. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Simon N. Foley |
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Pete Sterrantino, David Hacker, Ralph Fravel |
An Embedded Computer-Based Intraoperative Spinal Nerve Integrity Monitor. |
CBMS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ming Yao, Ernest Foo, Kun Peng, Ed Dawson |
An Improved Forward Integrity Protocol for Mobile Agents. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad H. Tehranipour, Nisar Ahmed, Mehrdad Nourani |
Multiple Transition Model and Enhanced Boundary Scan Architecture to Test Interconnects for Signal Integrity. |
ICCD |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Simon N. Foley |
Analysis of Integrity Policies using Soft Constraints. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Moti Yung |
Crypto-integrity. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Steffen Jurk, Mira Balaban |
Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. |
DEXA |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Andreas Meissner, Lars C. Wolf, Ralf Steinmetz |
A Novel Group Integrity Concept for Multimedia Multicasting. |
IDMS |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Jeevani Samantha Goonetillake, T. W. Carnduff, W. A. Gray |
Integrity Validation for Object Versions in a Co-operative Design Environment. |
CSCWD |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough |
A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. |
CSCWD |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Andreas Meissner, Lars C. Wolf, Wolfgang Schönfeld, Ralf Steinmetz |
A Framework for Group Integrity Management in Multimedia Multicasting. |
EUROMICRO |
2001 |
DBLP DOI BibTeX RDF |
|
24 | N. V. Arvind, P. R. Suresh, V. Sivakumar, Chandrani Pal, Debaprasad Das |
Integrated Crosstalk And Oxide Integrity Analysis In Dsm Designs. |
VLSI Design |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Enric Mayol, Ernest Teniente |
Addressing Efficiency Issues During the Process of Integrity Maintenance. |
DEXA |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Seongwoo Kim, Arun K. Somani |
Area Efficient Architectures for Information Integrity in Cache Memories. |
ISCA |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Susan Stepney |
Incremental Development of a High Integrity Compiler: Experience from an Industrial Development. |
HASE |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Véronique Benzaken, Xavier Schaefer |
Static Management of Integrity in Object-Oriented Databases: Design and Implementation. |
EDBT |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Anne Doucet, Sophie Monties |
Versions of Integrity Constraints in Multiversion Databases. |
DEXA |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Véronique Benzaken, Xavier Schaefer |
Static Integrity Constraint Management in Object-Oriented Database Programming Languages via Predicate Transformers. |
ECOOP |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Stefan Conrad 0001, Michael Höding, Gunter Saake, Ingo Schmitt, Can Türker |
Schema Integration with Integrity Constraints. |
BNCOD |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Hamidah Ibrahim, W. A. Gray, Nick J. Fiddian |
The Development of a Semantic Integrity Constraint Subsystem for a Distributed Database. |
BNCOD |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Dimitris Plexousakis, John Mylopoulos |
Accomodating Integrity Constraints During Database Design. |
EDBT |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Ceri, Piero Fraternali, Stefano Paraboschi, Letizia Tanca |
Automatic Generation of Production Rules for Integrity Maintenance. |
ACM Trans. Database Syst. |
1994 |
DBLP DOI BibTeX RDF |
automatic generation of production rules |
24 | Naci Ishakbeyoglu, Z. Meral Özsoyoglu |
On the Maintenance of Implication Integrity Constraints. |
DEXA |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Claudia Bauzer Medeiros, Patrick Pfeffer |
Object Integrity Using Rules. |
ECOOP |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Sami Harari |
Non-Linear Non-Commutative Functions for Data Integrity. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
24 | William H. Paxton |
A Client-Based Transaction System to Maintain Data Integrity. |
SOSP |
1979 |
DBLP DOI BibTeX RDF |
|
24 | Eduardo B. Fernández, Rita C. Summers |
Integrity aspects of a shared data base. |
AFIPS National Computer Conference |
1976 |
DBLP DOI BibTeX RDF |
|
24 | Michael Stonebraker |
Implementation of Integrity Constraints and Views by Query Modification. |
SIGMOD Conference |
1975 |
DBLP DOI BibTeX RDF |
|
21 | Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker 0001, Benjamin G. Zorn |
Modular Protections against Non-control Data Attacks. |
CSF |
2011 |
DBLP DOI BibTeX RDF |
non-control data attack, control-flow integrity, frame rule, data isolation, data integrity, Hoare logic, language-based security |
21 | Fan Zhang, Guoqing Wu, Min Jiang, Xiaoli Liu |
Concerning about Trust of Platform Hardware. |
PACIIA (2) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Integrity, Trusted Computing, TCG, Integrity Measurement |
21 | Ahmad Alsaadi |
A performance analysis approach based on the UML class diagram. |
WOSP |
2004 |
DBLP DOI BibTeX RDF |
QN performance model, data integrity constraints, data integrity model, performance values, UML class diagram |
21 | Andrew C. Jones, Iain Sutherland, Suzanne M. Embury, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt |
Techniques for Effective Integration, Maintenance and Evolution of Species Databases. |
SSDBM |
2000 |
DBLP DOI BibTeX RDF |
Taxonomic database, Species database, Integrity repair, Integrity constraints, Database integration, Biodiversity informatics |
21 | Amihai Motro |
Intensional Answers to Database Queries. |
IEEE Trans. Knowl. Data Eng. |
1994 |
DBLP DOI BibTeX RDF |
intensional information, data classes, extensional information, database answers, intensional statements, research directions, classifications, user interfaces, user interfaces, query processing, data integrity, database management systems, database systems, integrity constraints, inference rules, database queries, class hierarchies |
21 | Xiaolei Qian, Gio Wiederhold |
Incremental Recomputation of Active Relational Expressions. |
IEEE Trans. Knowl. Data Eng. |
1991 |
DBLP DOI BibTeX RDF |
active relational expressions, active queries, incremental recomputation, finite differencing techniques, relational databases, data integrity, monitors, query languages, views, integrity constraints, materialized views, update propagation, database updates, derived data |
21 | Chitta Baral, Sarit Kraus, Jack Minker |
Combining Multiple Knowledge Bases. |
IEEE Trans. Knowl. Data Eng. |
1991 |
DBLP DOI BibTeX RDF |
multiple knowledge base systems, single knowledge base, function symbols, maximal theory, data integrity, knowledge based system, knowledge based systems, database theory, deductive database, deductive databases, integrity constraints, maximality, view update problem |
21 | Clement T. Yu, Wei Sun 0002 |
Automatic Knowledge Acquisition and Maintenance for Semantic Query Optimization. |
IEEE Trans. Knowl. Data Eng. |
1989 |
DBLP DOI BibTeX RDF |
database states, statistic integrity constraints, dynamic integrity constraints, join predicates, constraints, knowledge based systems, knowledge acquisition, knowledge acquisition, database management systems, maintenance, semantic query optimization, interactive tool, automatic tool |
20 | Amel Mammar |
A systematic approach to generate B preconditions: application to the database domain. |
Softw. Syst. Model. |
2009 |
DBLP DOI BibTeX RDF |
B operations, Formal specification, Invariant, Integrity constraints, Precondition |
20 | Xiaotao Guo, Tian-Ge Zhuang |
A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. |
J. Digit. Imaging |
2009 |
DBLP DOI BibTeX RDF |
security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication |
20 | Ioannis G. Baltopoulos, Andrew D. Gordon 0001 |
Secure compilation of a multi-tier web language. |
TLDI |
2009 |
DBLP DOI BibTeX RDF |
cryptography, compilers, integrity, type systems, web programming, web application security |
20 | Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan |
TVDc: managing security in the trusted virtual datacenter. |
ACM SIGOPS Oper. Syst. Rev. |
2008 |
DBLP DOI BibTeX RDF |
virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control |
20 | Michael Paulitsch, Brendan Hall |
Starting and Resolving a Partitioned BRAIN. |
ISORC |
2008 |
DBLP DOI BibTeX RDF |
braided ring, TTP/C, IMA, communication platform, x-by-wire, synchronization, integrity, availability, BRAIN, time-triggered, FlexRay, start-up |
20 | Ming-Fang Lai, Hung-Ming Chen |
An Implementation of Performance-Driven Block and I/O Placement for Chip-Package Codesign. |
ISQED |
2008 |
DBLP DOI BibTeX RDF |
Chip-Package Codesign, I/O Placement, Power Integrity |
20 | Tuan Phan, Danfeng (Daphne) Yao |
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
algorithm, integrity, audit, networked virtual environments |
20 | Givon Zirkind |
AFIS data compression: an example of how domain specific compression algorithms can produce very high compression ratios. |
ACM SIGSOFT Softw. Eng. Notes |
2007 |
DBLP DOI BibTeX RDF |
AFIS, automated fingerprint identification systems, double compression, limits of compression, retrofitting, serial compression, software engineering, data integrity, compression, data compression, image compression, fingerprinting, graphics, portability, image quality, compatibility, data encryption |
20 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
20 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. |
ICDS |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
20 | Ying Guo, Xiushan Lu |
An Efficient New Method on Accurately Estimating Galileo VPL. |
CCTA |
2007 |
DBLP DOI BibTeX RDF |
integrity theory, SISE, VPL, Galileo |
20 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
20 | Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng |
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
integrity protection, originator’s rights, security, protocol, fragile watermarking, ubiquitous environment, Multimedia service |
20 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
20 | John Grant, Anthony Hunter |
Measuring inconsistency in knowledgebases. |
J. Intell. Inf. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Conflict resolution, Integrity constraints, Inconsistency, Paraconsistent logic |
20 | Ajoy Kumar Palit, Kishore K. Duganapalli, Walter Anheier |
Modeling of Crosstalk Fault in Defective Interconnects. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
defect-based-crosstalk fault model, signal integrity losses, aggres-sor-victim, ABCD-model, crosstalk-hazards |
20 | Kenneth G. Paterson, Arnold K. L. Yau |
Cryptography in Theory and Practice: The Case of Encryption in IPsec. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
integrity, encryption, IPsec, ESP |
20 | Qiang Huang, David Jao, Helen J. Wang |
Applications of secure electronic voting to automated privacy-preserving troubleshooting. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
automatic troubleshooting, privacy, integrity, homomorphic encryption, zero knowledge proof |
Displaying result #301 - #400 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|