Sciweavers

1369 search results - page 132 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 5 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
IPCCC
2006
IEEE
15 years 5 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 4 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
NSPW
2004
ACM
15 years 4 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICICS
2004
Springer
15 years 4 months ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen