Sciweavers

6195 search results - page 1198 / 1239
» Cloud Computing Security
Sort
View
SAC
2000
ACM
15 years 8 months ago
The Mobile Agent Technology to Support and to Access Museum Information
The global scenario put together by communication networks determines new opportunities towards the realization of Internetbased distributed services in many complex and composite...
Paolo Bellavista, Antonio Corradi, Andrea Tomasi
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
SIGGRAPH
1999
ACM
15 years 8 months ago
Multi-color and Artistic Dithering
A multi-color dithering algorithm is proposed, which converts a barycentric combination of color intensities into a multi-color nonoverlapping surface coverage. Multi-color dither...
Victor Ostromoukhov, Roger D. Hersch
RAID
1999
Springer
15 years 8 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
NSPW
1998
ACM
15 years 8 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
« Prev « First page 1198 / 1239 Last » Next »