Sciweavers

311 search results - page 24 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Dissemination Protocol to Guarantee Data Accessibility within N-Hops for Wireless Sensor Networks
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks (WSNs) is energy efficiency. Flooding and SPIN, which are very well-known proactive ...
Moonseong Kim, Matt W. Mutka, Sang-Hun Cho, Hyunse...
ACSAC
1999
IEEE
15 years 5 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
ESORICS
2010
Springer
15 years 1 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
IEEEARES
2006
IEEE
15 years 7 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
ACSAC
2009
IEEE
15 years 5 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...