Sciweavers

173 search results - page 34 / 35
» Classification of RFID Attacks
Sort
View
IADIS
2003
13 years 6 months ago
Effects of Ordered Access Lists in Firewalls
Firewalls are hardware and software systems that protect a network from attacks coming from the Internet. Packet filtering firewalls are efficient, fast and provide a good level o...
Faheem Bukhatwa, Ahmed Patel
HUC
2010
Springer
13 years 6 months ago
Exploring end user preferences for location obfuscation, location-based services, and the value of location
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can revea...
A. J. Bernheim Brush, John Krumm, James Scott
DSS
2007
231views more  DSS 2007»
13 years 5 months ago
Self-healing systems - survey and synthesis
As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becom...
Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambh...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 8 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
KDD
2006
ACM
159views Data Mining» more  KDD 2006»
14 years 5 months ago
Global distance-based segmentation of trajectories
This work introduces distance-based criteria for segmentation of object trajectories. Segmentation leads to simplification of the original objects into smaller, less complex primi...
Aris Anagnostopoulos, Michail Vlachos, Marios Hadj...