Sciweavers

2503 search results - page 234 / 501
» Building Computer Network Attacks
Sort
View
139
Voted
AINA
2004
IEEE
15 years 6 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
ADHOCNOW
2009
Springer
15 years 3 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
108
Voted
SAC
2008
ACM
15 years 2 months ago
Crime scene classification
In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be us...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
151
Voted
SSD
2005
Springer
188views Database» more  SSD 2005»
15 years 8 months ago
Capacity Constrained Routing Algorithms for Evacuation Planning: A Summary of Results
Abstract. Evacuation planning is critical for numerous important applications, e.g. disaster emergency management and homeland defense preparation. Efficient tools are needed to pr...
Qingsong Lu, Betsy George, Shashi Shekhar
118
Voted
ANCS
2007
ACM
15 years 6 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang