Sciweavers

1527 search results - page 39 / 306
» A Survey of Web Security
Sort
View
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 8 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
GIL
2010
14 years 9 months ago
Agribusiness 2.0
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille
JSA
2007
139views more  JSA 2007»
14 years 11 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
COMCOM
2004
79views more  COMCOM 2004»
14 years 11 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
CHI
2011
ACM
14 years 2 months ago
Human computation: a survey and taxonomy of a growing field
The rapid growth of human computation within research and industry has produced many novel ideas aimed at organizing web users to do great things. However, the growth is not adequ...
Alexander J. Quinn, Benjamin B. Bederson