A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Field Programmable Gate Array Applications—A Scientometric Review
2019
Computation
Here we found the top 150 applications that we divided into the following categories: digital control, communication interfaces, networking, computer security, cryptography techniques, machine learning ...
Also, we present an evolution and trend analysis of the related applications. ...
In Proceedings of the 14th ACM Conference on Computer
and Communications Security, CCS'07, Alexandria, VA, USA, 29 October-2 November 2007. [CrossRef]
401. ...
doi:10.3390/computation7040063
fatcat:wxtatzsvvnfopghdfl25hcfc2a
A Composite-Metric Based Path Selection Technique for the Tor Anonymity Network
[article]
2017
arXiv
pre-print
In this paper, we proposed an algorithm for improving performance and security of the Tor network, by employing a combination of different metrics in the process of the path selection between the source ...
More importantly, the proposed technique only requires a software upgrade on the client side, and other Tor nodes do not need to be modified. ...
ACM conference on Computer and Communications Security alexa . com / topsites, 2012, [Online; accessed 23-August-2012].
(CCS 2011), October 2011. ...
arXiv:1707.02520v1
fatcat:zl7aon6sqbb6bn4rjz2wczcdxy
Deep Learning for Text Style Transfer: A Survey
2021
Computational Linguistics
We also provide discussions on a variety of important topics regarding the future development of this task. ...
We discuss the task formulation, existing datasets and subtasks, evaluation, as well as the rich methodologies in the presence of parallel and non-parallel data. ...
Washington, DC,
Processing and the 9th International Joint USA, 12-14 December 2010, pages 958–961,
Conference on Natural Language Processing, IEEE Computer Society. ...
doi:10.1162/coli_a_00426
fatcat:v7vmb62ckfcu5k5mpu2pydnrxy
Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems
Spufing u civilnoj avijaciji - bezbednosnost i sigurnosnost GPS/GNSS i ADS-B sistema
2021
Megatrend Revija
Spufing u civilnoj avijaciji - bezbednosnost i sigurnosnost GPS/GNSS i ADS-B sistema
This paper focuses on spoofing/antispuffing of GNSS and ABS-B systems in civil aviation and provides an overview of the latest research in these areas. ...
Aircraft systems that rely on satellite positioning technology, such as GNSS and ADS-B, can be the target of a spoofing attack - a sophisticated and very dangerous form of radio frequency interference ...
the requirements for successful GPS spoofing attacks", Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL. ...
doi:10.5937/megrev2103281k
fatcat:daabobfcurhqbjcuflnpeaxfke
Query Processing in Blockchain Systems: Current State and Future Challenges
2021
Future Internet
When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner ...
The increasing use of Internet of Things technologies and the resulting digitization in many domains, however, have led to a plethora of novel use cases for a secure digital ledger. ...
In Proceedings of
the 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS ’21, Washington, DC, USA, 7–10 July
2021; pp. 584–594.
139. ...
doi:10.3390/fi14010001
fatcat:axmnkcheyjegjbbhgr4gv5345i
Defending against redirect attacks in mobile IP
2002
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment. ...
The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the ...
To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CCS'02, November 18-22, 2002 , Washington, DC, USA. ...
doi:10.1145/586119.586120
fatcat:ciz67bp74nachhkmkzlf3lsvvq
Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction
2021
Symmetry
The experimental results obtained on the security performance of the proposed AEADS system are notable and the proposed system can then be used to protect data and authenticate their sources. ...
The MDC is implemented with two variants of width, i.e., 512 and 1024 bits. We tested our proposed scheme against the different cryptanalytic attacks. ...
In Proceedings of the 9th ACM Conference on Computer and
Communications Security 2002, Washington, DC, USA, 18–22 November 2002; pp. 98–107.
32. Siegenthaler, T. ...
doi:10.3390/sym13122432
fatcat:frwiostg4factit4fqwaiht7ge
Defending against redirect attacks in mobile IP
2002
Proceedings of the 9th ACM conference on Computer and communications security - CCS '02
We also show that our protocol achieves strong security and at the same time is highly scalable to wide spread deployment. ...
The route optimization operation in Mobile IP Version 6 (MIPv6) allows direct routing from any correspondent node to any mobile node and thus eliminates the problem of "triangle routing" present in the ...
To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. CCS'02, November 18-22, 2002 , Washington, DC, USA. ...
doi:10.1145/586110.586120
dblp:conf/ccs/DengZB02
fatcat:l7jgajx4tjb3bmzwqulally56y
An investigation of proposed techniques for quantifying confidence in assurance arguments
2017
Safety Science
And as others have observed, the seductive appearance of computational rigor might cause decision-makers to mistakenly place trust in "superficially plausible nonsense" [10]. ...
The use of safety cases in certification raises the question of assurance argument su ciency and the issue of confidence (or uncertainty) in the argument's claims. ...
We thank John McDermid, Andrew Rae, and the branch and directorate reviewers for their feedback on this work. ...
doi:10.1016/j.ssci.2016.09.014
fatcat:c3adi6biyjgitfiwbvxucrdi7y
Friending Brandeis: Privacy and Government Surveillance in the Era of Social Media
2012
Social Science Research Network
Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC ...
the data needed, and completing and reviewing the collection of information. ...
Cranor, "The Cost of Reading Privacy Policies," ACM Transactions on Computer-Human Interaction 389, no. 3 (2008): 1, http://www.mendeley.com/research/the-cost-of-reading-privacy-policies/. ...
doi:10.2139/ssrn.2049013
fatcat:b2bunk2sjbebna7hcl73otk65y
Prêt à Voter Providing Everlasting Privacy
[chapter]
2013
Lecture Notes in Computer Science
Ashish Choudhary for comments on multi-party computation, Markulf Kohlweiss for comments on the design of the CKLM12/13 protocols and Dr. ...
Hugo Jonker for organising a PhD workshop on voting in 2012 at which the authors of this paper met and came up with the ideas for this paper. ...
In Proceedings of the 9th ACM conference on Computer and communications security, CCS '02, pages 68-77, New York, NY, USA, 2002. ACM. 3. Rafik Chaabouni, Helger Lipmaa, and Abhi Shelat. ...
doi:10.1007/978-3-642-39185-9_10
fatcat:5dkjajb5rjfstef4csslxlu4cm
Recent Developments in Federal Income Taxation: The Year 2009
2022
Florida Tax Review
The outline focuses primarily on topics of broad general interest (to the three of us, at least) – income tax accounting rules, determination of gross income, allowable deductions, treatment of capital ...
principles are highlighted – unless one of us decides to go nuts and spend several pages writing it up. ...
and provided that the "loan" of the securities would terminate on January 15, 2003, or at the taxpayer's election on July 1 or December 2, 2002. ...
doi:10.5744/ftr.2010.1001
fatcat:kjxmqedllnhohlmhh3hjr4czu4
TALLINNA TEHNIKAÜLIKOOLI PUBLIKATSIOONID 2015
unpublished
2015) : 18-20 February 2015, Washington, DC, USA. ...
Simulation study of the three-level boost DC-DC converter with full ZVS for PV application // ICPE 2015 -ECCE Asia : 9th International Conference on Power Electronics -йCCй Asia : "G ee Wo ld ith Po e ...
fatcat:p556mpv4orbjdgjfr27ihjqk3q
The Nexus of Copyright and Intellectual Privacy
2012
Social Science Research Network
Without them, and without the support and encouragement of our families (and especially my mother), this project would not have been completed. ...
ACKNOWLEDGEMENTS For their steadfast and complete support, I am eternally grateful to my amazing wife and children. ...
CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers (New York: Springer, 2002) 137; Yee Fen Lim, "Digital Rights Management: Merging Contract, Copyright and Criminal Law" ...
doi:10.2139/ssrn.2131308
fatcat:tjkgtpk5ancypomii3fcycpfa4
EMBnet.journal 18 Suppl. B
2012
EMBnet journal
Segagni et al, presented at the DILS 2012 conference in Washington DC. ...
National Research Council of Italy (CNR) and the Polish Academy of Sciences (PAN
Acknowledgements This work is partial fulfillment of the research objective of "DM19410 -Laboratorio di Bioinformatica ...
In Proc. of the 9th Int'l Conference on Logic Programming and Nonmonotonic Reasoning, pages 260-265. 11. ...
doi:10.14806/ej.18.b.592
fatcat:wlwsmbdlfzbjtk7vyhiabdov6q
« Previous
Showing results 1 — 15 out of 26 results