Sciweavers

27 search results - page 1 / 6
» acsw 2004
Sort
View
ACSW
2004
13 years 6 months ago
Secure Key Issuing in ID-based Cryptography
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
ACSW
2004
13 years 6 months ago
Survivability and Business Continuity Management
With the number of attacks on systems increasing, it is highly probable that sooner or later an intrusion will be successful. Not having to execute a complete shutdown in this sit...
Gerald Quirchmayr
ACSW
2004
13 years 6 months ago
Visualisation and Comparison of Image Collections based on Self-organised Maps
Self-organised maps (SOM) have been widely used for cluster analysis and visualisation purposes in exploratory data mining. In image retrieval applications, SOMs have been used to...
Da Deng, Jianhua Zhang, Martin K. Purvis
ACSW
2004
13 years 6 months ago
Defining Security Services for Electronic Tendering
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requir...
Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald