It is expected that the next generation of smart card will be more intelligent, more interactive and more interoperable. We call these the 3i requirements. A smart card wallet sys...
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...