Sciweavers

1527 search results - page 39 / 306
» A Survey of Web Security
Sort
View
104
Voted
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 10 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
92
Voted
GIL
2010
14 years 10 months ago
Agribusiness 2.0
Abstract: Die Anwendung von Web 2.0 Tools innerhalb von Unternehmen erm
Jurek Hille
101
Voted
JSA
2007
139views more  JSA 2007»
15 years 18 days ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
COMCOM
2004
79views more  COMCOM 2004»
15 years 17 days ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
81
Voted
CHI
2011
ACM
14 years 4 months ago
Human computation: a survey and taxonomy of a growing field
The rapid growth of human computation within research and industry has produced many novel ideas aimed at organizing web users to do great things. However, the growth is not adequ...
Alexander J. Quinn, Benjamin B. Bederson