Filters








26 Hits in 11.0 sec

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
Here we found the top 150 applications that we divided into the following categories: digital control, communication interfaces, networking, computer security, cryptography techniques, machine learning  ...  Also, we present an evolution and trend analysis of the related applications.  ...  In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07, Alexandria, VA, USA, 29 October-2 November 2007. [CrossRef] 401.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

A Composite-Metric Based Path Selection Technique for the Tor Anonymity Network [article]

Sadegh Momeni Milajerdi, Mehdi Kharrazi
2017 arXiv   pre-print
In this paper, we proposed an algorithm for improving performance and security of the Tor network, by employing a combination of different metrics in the process of the path selection between the source  ...  More importantly, the proposed technique only requires a software upgrade on the client side, and other Tor nodes do not need to be modified.  ...  ACM conference on Computer and Communications Security alexa . com / topsites, 2012, [Online; accessed 23-August-2012]. (CCS 2011), October 2011.  ... 
arXiv:1707.02520v1 fatcat:zl7aon6sqbb6bn4rjz2wczcdxy

Deep Learning for Text Style Transfer: A Survey

Di Jin, Zhijing Jin, Zhiting Hu, Olga Vechtomova, Rada Mihalcea
2021 Computational Linguistics  
We also provide discussions on a variety of important topics regarding the future development of this task.  ...  We discuss the task formulation, existing datasets and subtasks, evaluation, as well as the rich methodologies in the presence of parallel and non-parallel data.  ...  Washington, DC, Processing and the 9th International Joint USA, 12-14 December 2010, pages 958–961, Conference on Natural Language Processing, IEEE Computer Society.  ... 
doi:10.1162/coli_a_00426 fatcat:v7vmb62ckfcu5k5mpu2pydnrxy

Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems
Spufing u civilnoj avijaciji - bezbednosnost i sigurnosnost GPS/GNSS i ADS-B sistema

Dejan Kožović, Dragan Đurđević
2021 Megatrend Revija  
This paper focuses on spoofing/antispuffing of GNSS and ABS-B systems in civil aviation and provides an overview of the latest research in these areas.  ...  Aircraft systems that rely on satellite positioning technology, such as GNSS and ADS-B, can be the target of a spoofing attack - a sophisticated and very dangerous form of radio frequency interference  ...  the requirements for successful GPS spoofing attacks", Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL.  ... 
doi:10.5937/megrev2103281k fatcat:daabobfcurhqbjcuflnpeaxfke

Query Processing in Blockchain Systems: Current State and Future Challenges

Dennis Przytarski, Christoph Stach, Clémentine Gritti, Bernhard Mitschang
2021 Future Internet  
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner  ...  The increasing use of Internet of Things technologies and the resulting digitization in many domains, however, have led to a plethora of novel use cases for a secure digital ledger.  ...  In Proceedings of the 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS ’21, Washington, DC, USA, 7–10 July 2021; pp. 584–594. 139.  ... 
doi:10.3390/fi14010001 fatcat:axmnkcheyjegjbbhgr4gv5345i

Defending against redirect attacks in mobile IP

Robert H. Deng, Jianying Zhou, Feng Bao
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment.  ...  The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CCS'02, November 18-22, 2002 , Washington, DC, USA.  ... 
doi:10.1145/586119.586120 fatcat:ciz67bp74nachhkmkzlf3lsvvq

Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction

Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
2021 Symmetry  
The experimental results obtained on the security performance of the proposed AEADS system are notable and the proposed system can then be used to protect data and authenticate their sources.  ...  The MDC is implemented with two variants of width, i.e., 512 and 1024 bits. We tested our proposed scheme against the different cryptanalytic attacks.  ...  In Proceedings of the 9th ACM Conference on Computer and Communications Security 2002, Washington, DC, USA, 1822 November 2002; pp. 98–107. 32. Siegenthaler, T.  ... 
doi:10.3390/sym13122432 fatcat:frwiostg4factit4fqwaiht7ge

Defending against redirect attacks in mobile IP

Robert H. Deng, Jianying Zhou, Feng Bao
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment.  ...  The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CCS'02, November 18-22, 2002 , Washington, DC, USA.  ... 
doi:10.1145/586110.586120 dblp:conf/ccs/DengZB02 fatcat:l7jgajx4tjb3bmzwqulally56y

An investigation of proposed techniques for quantifying confidence in assurance arguments

Patrick J. Graydon, C. Michael Holloway
2017 Safety Science  
And as others have observed, the seductive appearance of computational rigor might cause decision-makers to mistakenly place trust in "superficially plausible nonsense" [10].  ...  The use of safety cases in certification raises the question of assurance argument su ciency and the issue of confidence (or uncertainty) in the argument's claims.  ...  We thank John McDermid, Andrew Rae, and the branch and directorate reviewers for their feedback on this work.  ... 
doi:10.1016/j.ssci.2016.09.014 fatcat:c3adi6biyjgitfiwbvxucrdi7y

Friending Brandeis: Privacy and Government Surveillance in the Era of Social Media

Elizabeth Gaffin
2012 Social Science Research Network  
Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC  ...  the data needed, and completing and reviewing the collection of information.  ...  Cranor, "The Cost of Reading Privacy Policies," ACM Transactions on Computer-Human Interaction 389, no. 3 (2008): 1, http://www.mendeley.com/research/the-cost-of-reading-privacy-policies/.  ... 
doi:10.2139/ssrn.2049013 fatcat:b2bunk2sjbebna7hcl73otk65y

Prêt à Voter Providing Everlasting Privacy [chapter]

Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann
2013 Lecture Notes in Computer Science  
Ashish Choudhary for comments on multi-party computation, Markulf Kohlweiss for comments on the design of the CKLM12/13 protocols and Dr.  ...  Hugo Jonker for organising a PhD workshop on voting in 2012 at which the authors of this paper met and came up with the ideas for this paper.  ...  In Proceedings of the 9th ACM conference on Computer and communications security, CCS '02, pages 68-77, New York, NY, USA, 2002. ACM. 3. Rafik Chaabouni, Helger Lipmaa, and Abhi Shelat.  ... 
doi:10.1007/978-3-642-39185-9_10 fatcat:5dkjajb5rjfstef4csslxlu4cm

Recent Developments in Federal Income Taxation: The Year 2009

Martin J. McMahon, Jr., Ira B. Shepard, Daniel L. Simmons
2022 Florida Tax Review  
The outline focuses primarily on topics of broad general interest (to the three of us, at least) – income tax accounting rules, determination of gross income, allowable deductions, treatment of capital  ...  principles are highlighted – unless one of us decides to go nuts and spend several pages writing it up.  ...  and provided that the "loan" of the securities would terminate on January 15, 2003, or at the taxpayer's election on July 1 or December 2, 2002.  ... 
doi:10.5744/ftr.2010.1001 fatcat:kjxmqedllnhohlmhh3hjr4czu4

TALLINNA TEHNIKAÜLIKOOLI PUBLIKATSIOONID 2015

Tallinna Raamatukogu
unpublished
2015) : 18-20 February 2015, Washington, DC, USA.  ...  Simulation study of the three-level boost DC-DC converter with full ZVS for PV application // ICPE 2015 -ECCE Asia : 9th International Conference on Power Electronics -йCCй Asia : "G ee Wo ld ith Po e  ... 
fatcat:p556mpv4orbjdgjfr27ihjqk3q

The Nexus of Copyright and Intellectual Privacy

Alex Cameron
2012 Social Science Research Network  
Without them, and without the support and encouragement of our families (and especially my mother), this project would not have been completed.  ...  ACKNOWLEDGEMENTS For their steadfast and complete support, I am eternally grateful to my amazing wife and children.  ...  CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers (New York: Springer, 2002) 137; Yee Fen Lim, "Digital Rights Management: Merging Contract, Copyright and Criminal Law"  ... 
doi:10.2139/ssrn.2131308 fatcat:tjkgtpk5ancypomii3fcycpfa4

EMBnet.journal 18 Suppl. B

EMBnet Journal
2012 EMBnet journal  
Segagni et al, presented at the DILS 2012 conference in Washington DC.  ...  National Research Council of Italy (CNR) and the Polish Academy of Sciences (PAN Acknowledgements This work is partial fulfillment of the research objective of "DM19410 -Laboratorio di Bioinformatica  ...  In Proc. of the 9th Int'l Conference on Logic Programming and Nonmonotonic Reasoning, pages 260-265. 11.  ... 
doi:10.14806/ej.18.b.592 fatcat:wlwsmbdlfzbjtk7vyhiabdov6q
« Previous Showing results 1 — 15 out of 26 results